
VP, IAM Authentication Technologies Leader
Synchrony
full-time
Posted on:
Location Type: Hybrid
Location: New York City • California, Illinois, New York • 🇺🇸 United States
Visit company websiteSalary
💰 $170,000 - $290,000 per year
Job Level
Senior
Tech Stack
AWSCyber SecurityLinuxPythonRPA
About the role
- Guide a team of IAM authentication technologies engineers in designing, developing, and implementing scalable, secure, and seamless solutions across the enterprise
- Own the workforce authentication strategy focused on security and user experience
- Communicate and get buy-in on strategy to key stakeholder groups
- Lead teams focused on Synchrony’s authentications tools and services including Okta, Yubikey, FIDO2, WebAuthN, Passwordless, and RSA Authentication Manager
- Advance the SSO, Directory Services, and MFA vision by creating business cases that support, quantify, and prioritize product initiatives that deliver the highest value
- Enhance and maintain oversight to Synchrony’s authentication policies, standards, and risk metrics
- Maintain technical knowledge of Synchrony’s application authentication and authorization architecture
- Understand and implement leading authentication and authorization industry trends, proposing strategies to continually increase Synchrony’s authentication security and user experience
- Develop and maintain value driven business relationships through effective needs analysis, program management, customer service and problem resolution
- Perform Information Security assessments, in conjunction with Sr. Application Security engineers, for key business applications to protect assets
- Provide strategic risk guidance for business and technology projects, including the evaluation and recommendation of authentication controls
- Identification of potential non-compliance issues, drive appropriate risk treatment, and drive remediation
- Act as subject matter expert on Information Security topics during audit and/or regulatory meetings, business requirements reviews, and architecture reviews
- Facilitate compliance to defined standards and develop tools to assist compliance
- Perform other duties and/or special projects as assigned
Requirements
- Bachelor's degree in Technology, Risk Management, or equivalent work experience
- Minimum 10 years in Information Technology, Risk Management, and/or Information Security
- Building, installing, and maintaining security tools and platforms for Information Security
- Analyzing log data in order to model cybersecurity threats and discover relevant patterns
- Partnering with broader Information Security and operations groups to build tailored solutions for unique problems
- Automating team and business processes where possible (through RPA or Python scripts)
- Evaluating existing team processes and technologies and applying DevOps principles where possible
- Collaborating with technology teams to implement FW rules and Proxy requests for application functionality
- Implementing new technologies by building out new Virtual Machines, installing dependencies, application software, etc.
- Proactively monitoring platform health and stability
- Operating in a Linux or Windows command-line environment to maintain services/applications
- Building customized automation workflows or tools using AWS
Benefits
- Flexible work arrangements
- Professional development opportunities
- Annual bonus based on individual and company performance
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
IAM authentication technologiesSSOMFARisk ManagementInformation SecurityPythonDevOpsLog analysisAutomationVirtual Machines
Soft skills
LeadershipCommunicationProblem resolutionCustomer serviceNeeds analysisCollaborationStrategic guidanceStakeholder engagementProgram managementCompliance facilitation
Certifications
Bachelor's degree in TechnologyBachelor's degree in Risk Management