Logo
Energy Jobline ZR

IAM Business Security Architect in Princeton

Energy Jobline ZR, Princeton, New Jersey, us, 08543

Save Job

Key Responsibilities Provide Business Architecture for Security support to meet primary goals for:

Maturing Business Architecture for Security

Operating Model

Staffing Plan

Clarifying Roles & Responsibilities

RACI

Role-Based Curricula Development

Onboarding Process Improvement

Reduce Ramp-up Time for New Hires

xIAM Architecture Advisory

Analysis

Reference Architecture

Solution Architecture

This is in order to (1) Advance client’s target state xIAM platforms/services with key capabilities around BYOID (Bring Your Own ID), common, modern authentication, core profile data management, consent & privacy management, etc.; and (2) Meet the xIAM needs of specific applications by leveraging target state xIAM platforms/services where available, or by delivering interim solutions when requisite target state xIAM platforms/services are not yet finalized.

Responsibilities

xIAM program architecture support

Support to advance product roadmap milestones, as needed

Align target skill sets with business objectives and deliverables

Develop RACI or related framework that outlines the resource roles and responsibilities in alignment with client objectives

Facilitate and develop new hire (resource) onboarding processes

Facilitate and develop new hire (resource) training content and processes

Facilitate playbook creation and maintenance protocol

Develop method to assess efficiency and effectiveness of onboarding processes

Define and document continuous improvement recommendations

Required Skills

7-10 years’ experience working in the Access Management (IAM) information security space in an architecture and engineering capacity.

5-7 years’ experience with the following:

Global Workforce IAM

Global Consumer IAM (CIAM)

Federation and single sign-on (B2B and B2C)

Institute of Standards and Technology (NIST) 800-53

NIST 800-63

NIST Cybersecurity Framework (CSF)

Experience creating high and low level IAM architecture patterns

Experience developing and implementing IAM strategies and roadmaps

Experience with major IAM platforms including:

Microsoft Active Directory

One Manager

Ping Federate

Experience building roles and responsibilities (e.g., RACI matrices)

Experience with process control design

Ability to work as liaison between business and information security technology

Ability to clearly explain IAM & xIAM concepts to audiences of various levels.

Broad and deep understanding of xIAM- and IAM-related capabilities, patterns, protocols, technologies, and solutions.

Intimately familiar with xIAM- and IAM-related protocols such as OAuth, OIDC, SAML, LDAP, SPML, XACML, SCIM, Kerberos, PKI (certs, CA’s, sigs, etc.)

Skills

Experience with App Gateways, App Proxies, Live Chat, Chat Bots, Contact Centers, IVRs and Web Portals for CIAM

Good understanding of MFA, PAM and Risk Based Authentication

Deep technical experience with two or more xIAM technologies including Okta, Janrain / Akamai, Forgerock, Microsoft Azure B2C, Amazon AWS Cognito.

Strong familiarity with adjacent technologies such as PingFederate/PingOne, IGA (e.g.: OneIM, Sailpoint), virtual directory (e.g.: Radiant), API management (e.g.: Apigee, Mulesoft).

Understanding of industry and leading practices including industry standards such as the Institute for Standards and Technology (NIST) Special Publication (SP) 800-63; Digital Authentication, NIST Cybersecurity Framework (CSF) and NIST SP 800-53; Security and Privacy Controls.

Business process engineering experience

Strong project management skills

A deep overall understanding of business & technology transformation around digital both within and across enterprises, providers, and other entities.

Excellent interpersonal communication skills with strong spoken and written English.

Business outcomes mindset.

Understanding of global regulations and compliance frameworks including:

NY DFS

CCPA

GDPR

Solid balance of strategic thinking with detail.

Collaborative team worker – both in person and virtually using MS Teams or similar.

Flexibility to accommodate working across different time zones.

CISSP, CISM, or equivalent certification a plus.

Required Education

BS in Computer Science or related field of study, or equivalent work experience

Education

Cybersecurity certifications such as CISSP, CISM, etc.

#J-18808-Ljbffr