Salary
💰 $115,044 - $184,072 per year
Tech Stack
AWSAzureCloudCyber SecurityDistributed SystemsLinuxUnix
About the role
- Oversee IAM processes, including: Access management and governance; Privileged access management; Identity management; Implementation of IAM technologies (e.g. SSO, MFA, passwordless authentication).
- Lead a global team of remote security professionals providing guidance to functional and business units on appropriate security practices and solutions.
- Responsible for all aspects of the manager's job model, including hiring, team budget, performance management, workload management and professional development.
- Support execution of the organization’s Strategic Security Plan and collaborate with partners to maintain the security architecture design.
- Create, maintain, and approve security documentation (policies, standards, guidelines, and procedures).
- Participate in audit, compliance, and regulatory efforts, including PCI DSS, ISO 27001, SOC 2 Type II, and security audits.
- Act as a subject matter expert across all IAM disciplines.
- Perform off-hours work when necessary to minimize disruptions.
- Maintain regular and reliable attendance.
- Domestic and international travel up to 5% may be required.
Requirements
- Bachelor’s degree in Cybersecurity, Computer Science, IT, or related field plus 5 years of relevant experience.
- Leadership experience managing a team of individual contributors.
- Implementation, operation, or evaluation of IAM and zero trust programs.
- Extensive experience developing enterprise security documentation, managing cross-functional projects, and leveraging KPIs to measure performance and drive improvement.
- Experience with access management, governance, privileged access management compliance, and vendor management for security solutions.
- Expertise balancing regulatory, business, audit, and architectural requirements.
- Knowledge, Skills, and Abilities Deep understanding of zero trust, SSO, MFA, and IAM concepts.
- Familiarity with regulatory, compliance, and security requirements (e.g., PCI DSS, SOC 2 Type II, HIPAA, privacy laws).