Essential Functions:
Identity and Access Management
• Design, implement, and manage identity services solutions, including authentication, authorization, and identity lifecycle management to provide a strong IAM program.
• Ensure the integrity and security of the College's identity data.
• Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement.
• Develop and maintain Role-Based Access control (RBAC), Attribute-Based Access control (ABAC), and least-privilege models to reduce access risk.
• Integrate systems with Single Sign-on (SSO) and Multi-Factor Authentication (MFA) using SSO and MFA technologies.
• Implement and manage Privileged Account Management (PAM) controls including credential vaulting and session monitoring.
• Monitor, investigate, and respond to IAM-related incidents, abnormal login behavior, and security alerts.
• Maintain detailed documentation of IAM architecture, configurations, integrations, and process flows.
• Ensure IAM alignment with regulatory, audit, and compliance requirements across the organization.
• Identify the broader impact of current decisions related to user access, data access and information security
Strategic Leadership
• Envisions organizational outcomes and facilitates alignment with them.
• Aligns IAM processes across the organization, and develops and documents standards for organizational use.
• Understands business and information technology management processes and demonstrates advanced understanding of business processes, internal control risk management, IT controls and related standards.
• Lead the planning, development, and execution of IAM projects, ensuring they are completed on time and within budget and aligned with IAM best practices.
• Collaborate with security architecture, application owners, and infrastructure teams to design scalable and secure IAM solutions.
• Define and track IAM metrics, KPIs, and maturity indicators to support continuous improvement.
• Advise senior management on IAM-related risks and security posture.
Awareness, Training and Other Communications
• Fosters an understanding of the need for and application of the IAM system, and facilitates decision making with the end users.
• Builds and nurtures positive working relationships with College units and departments.
• Identifies opportunities to improve engagement with the College units and departments.
Perform other duties as assigned
|
Broad knowledge of computer security issues, requirements, solutions, and trends, especially in the higher education environment.\
• Knowledge of applicable business processes and operations of customer organizations.
• Knowledge of new and emerging information technology (IT) and information security technologies.
• Knowledge of risk management processes, including steps and methods for assessing risk.
• Knowledge of system lifecycle management principles, including software security and usability.
• Knowledge of critical information technology (IT) procurement requirements.
• Strong interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration, and cooperation.
• Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse.
• Ability to think critically and analyze information and situations, present findings and make recommendations; ability to turn data into information and present it in a meaningful manner.
• Ability to analyze issues and solve sensitive and complex problems under pressure. Skilled in interpersonal communication and conflict resolution.
• Excellent written and verbal skills.
• Excellent presentation skills and experience in public speaking or training.
Competencies:
• Decision Making
o Decisions may affect a work unit or area within a department. May contribute to business and operational decisions that affect the department.
• Problem Solving
o Problems are varied, requiring analysis or interpretation of the situation. Problems are solved using knowledge and skills, and general precedents and practices.
• Independence of Action
o Results are defined and existing practices are used as guidelines to determine specific work methods and carries out work activities independently; supervisor/manager is available to resolve problems.
• Communication and Collaboration
o Contacts and information are primarily within the job’s working group, department and/or campus.
o Contacts and information sharing are external to the job’s department, but internal to the campus/campuses (i.e. other departments/campuses, central administration/services such as Human Resources, Payroll, Finance, Facilities, Mail Services, Student Services, etc.)
o Contacts and information sharing are internal/external to the College, for the primary reason of scheduling, coordinating services, collaborating, etc.
Required Industry Certifications
• At least one relevant certification, e.g. Certified Identity and Access Manager (CIAM), Certified Identity Management Professional (CIMP), Certified Identity Governance Expert (CIGE), Certified Information Systems Security Professional (CISSP |