Energy Jobline ZR
IAM Business Security Architect in Princeton
Energy Jobline ZR, Princeton, New Jersey, us, 08543
Key Responsibilities
Provide Business Architecture for Security support to meet primary goals for:
Maturing Business Architecture for Security
Operating Model
Staffing Plan
Clarifying Roles & Responsibilities
RACI
Role-Based Curricula Development
Onboarding Process Improvement
Reduce Ramp-up Time for New Hires
xIAM Architecture Advisory
Analysis
Reference Architecture
Solution Architecture
This is in order to (1) Advance client’s target state xIAM platforms/services with key capabilities around BYOID (Bring Your Own ID), common, modern authentication, core profile data management, consent & privacy management, etc.; and (2) Meet the xIAM needs of specific applications by leveraging target state xIAM platforms/services where available, or by delivering interim solutions when requisite target state xIAM platforms/services are not yet finalized.
Responsibilities
xIAM program architecture support
Support to advance product roadmap milestones, as needed
Align target skill sets with business objectives and deliverables
Develop RACI or related framework that outlines the resource roles and responsibilities in alignment with client objectives
Facilitate and develop new hire (resource) onboarding processes
Facilitate and develop new hire (resource) training content and processes
Facilitate playbook creation and maintenance protocol
Develop method to assess efficiency and effectiveness of onboarding processes
Define and document continuous improvement recommendations
Required Skills
7-10 years’ experience working in the Access Management (IAM) information security space in an architecture and engineering capacity.
5-7 years’ experience with the following:
Global Workforce IAM
Global Consumer IAM (CIAM)
Federation and single sign-on (B2B and B2C)
Institute of Standards and Technology (NIST) 800-53
NIST 800-63
NIST Cybersecurity Framework (CSF)
Experience creating high and low level IAM architecture patterns
Experience developing and implementing IAM strategies and roadmaps
Experience with major IAM platforms including:
Microsoft Active Directory
One Manager
Ping Federate
Experience building roles and responsibilities (e.g., RACI matrices)
Experience with process control design
Ability to work as liaison between business and information security technology
Ability to clearly explain IAM & xIAM concepts to audiences of various levels.
Broad and deep understanding of xIAM- and IAM-related capabilities, patterns, protocols, technologies, and solutions.
Intimately familiar with xIAM- and IAM-related protocols such as OAuth, OIDC, SAML, LDAP, SPML, XACML, SCIM, Kerberos, PKI (certs, CA’s, sigs, etc.)
Skills
Experience with App Gateways, App Proxies, Live Chat, Chat Bots, Contact Centers, IVRs and Web Portals for CIAM
Good understanding of MFA, PAM and Risk Based Authentication
Deep technical experience with two or more xIAM technologies including Okta, Janrain / Akamai, Forgerock, Microsoft Azure B2C, Amazon AWS Cognito.
Strong familiarity with adjacent technologies such as PingFederate/PingOne, IGA (e.g.: OneIM, Sailpoint), virtual directory (e.g.: Radiant), API management (e.g.: Apigee, Mulesoft).
Understanding of industry and leading practices including industry standards such as the Institute for Standards and Technology (NIST) Special Publication (SP) 800-63; Digital Authentication, NIST Cybersecurity Framework (CSF) and NIST SP 800-53; Security and Privacy Controls.
Business process engineering experience
Strong project management skills
A deep overall understanding of business & technology transformation around digital both within and across enterprises, providers, and other entities.
Excellent interpersonal communication skills with strong spoken and written English.
Business outcomes mindset.
Understanding of global regulations and compliance frameworks including:
NY DFS
CCPA
GDPR
Solid balance of strategic thinking with detail.
Collaborative team worker – both in person and virtually using MS Teams or similar.
Flexibility to accommodate working across different time zones.
CISSP, CISM, or equivalent certification a plus.
Required Education
BS in Computer Science or related field of study, or equivalent work experience
Education
Cybersecurity certifications such as CISSP, CISM, etc.
#J-18808-Ljbffr
Maturing Business Architecture for Security
Operating Model
Staffing Plan
Clarifying Roles & Responsibilities
RACI
Role-Based Curricula Development
Onboarding Process Improvement
Reduce Ramp-up Time for New Hires
xIAM Architecture Advisory
Analysis
Reference Architecture
Solution Architecture
This is in order to (1) Advance client’s target state xIAM platforms/services with key capabilities around BYOID (Bring Your Own ID), common, modern authentication, core profile data management, consent & privacy management, etc.; and (2) Meet the xIAM needs of specific applications by leveraging target state xIAM platforms/services where available, or by delivering interim solutions when requisite target state xIAM platforms/services are not yet finalized.
Responsibilities
xIAM program architecture support
Support to advance product roadmap milestones, as needed
Align target skill sets with business objectives and deliverables
Develop RACI or related framework that outlines the resource roles and responsibilities in alignment with client objectives
Facilitate and develop new hire (resource) onboarding processes
Facilitate and develop new hire (resource) training content and processes
Facilitate playbook creation and maintenance protocol
Develop method to assess efficiency and effectiveness of onboarding processes
Define and document continuous improvement recommendations
Required Skills
7-10 years’ experience working in the Access Management (IAM) information security space in an architecture and engineering capacity.
5-7 years’ experience with the following:
Global Workforce IAM
Global Consumer IAM (CIAM)
Federation and single sign-on (B2B and B2C)
Institute of Standards and Technology (NIST) 800-53
NIST 800-63
NIST Cybersecurity Framework (CSF)
Experience creating high and low level IAM architecture patterns
Experience developing and implementing IAM strategies and roadmaps
Experience with major IAM platforms including:
Microsoft Active Directory
One Manager
Ping Federate
Experience building roles and responsibilities (e.g., RACI matrices)
Experience with process control design
Ability to work as liaison between business and information security technology
Ability to clearly explain IAM & xIAM concepts to audiences of various levels.
Broad and deep understanding of xIAM- and IAM-related capabilities, patterns, protocols, technologies, and solutions.
Intimately familiar with xIAM- and IAM-related protocols such as OAuth, OIDC, SAML, LDAP, SPML, XACML, SCIM, Kerberos, PKI (certs, CA’s, sigs, etc.)
Skills
Experience with App Gateways, App Proxies, Live Chat, Chat Bots, Contact Centers, IVRs and Web Portals for CIAM
Good understanding of MFA, PAM and Risk Based Authentication
Deep technical experience with two or more xIAM technologies including Okta, Janrain / Akamai, Forgerock, Microsoft Azure B2C, Amazon AWS Cognito.
Strong familiarity with adjacent technologies such as PingFederate/PingOne, IGA (e.g.: OneIM, Sailpoint), virtual directory (e.g.: Radiant), API management (e.g.: Apigee, Mulesoft).
Understanding of industry and leading practices including industry standards such as the Institute for Standards and Technology (NIST) Special Publication (SP) 800-63; Digital Authentication, NIST Cybersecurity Framework (CSF) and NIST SP 800-53; Security and Privacy Controls.
Business process engineering experience
Strong project management skills
A deep overall understanding of business & technology transformation around digital both within and across enterprises, providers, and other entities.
Excellent interpersonal communication skills with strong spoken and written English.
Business outcomes mindset.
Understanding of global regulations and compliance frameworks including:
NY DFS
CCPA
GDPR
Solid balance of strategic thinking with detail.
Collaborative team worker – both in person and virtually using MS Teams or similar.
Flexibility to accommodate working across different time zones.
CISSP, CISM, or equivalent certification a plus.
Required Education
BS in Computer Science or related field of study, or equivalent work experience
Education
Cybersecurity certifications such as CISSP, CISM, etc.
#J-18808-Ljbffr