Corebridge Financial
VP, Authentication Governance Senior Manager
Corebridge Financial, Houston, Texas, United States, 77001
VP, Authentication Governance Senior Manager
At Corebridge Financial, we believe action is everything. That's why every day we partner with financial professionals and institutions to make it possible for more people to take action in their financial lives, for today and tomorrow. We align to a set of values that are the core pillars that define our culture and help bring our brand purpose to life: We are stronger as one: We collaborate across the enterprise, scale what works and act decisively for our customers and partners. We deliver on commitments: We are accountable, empower each other and go above and beyond for our stakeholders. We learn, improve and innovate: We get better each day by challenging the status quo and equipping ourselves for the future. We are inclusive: We embrace different perspectives, enabling our colleagues to make an impact and bring their whole selves to work. The Information Technology organization is the technological foundation of our business and works in collaboration with our partners from across the company. The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles. The VP, Authentication Governance Senior Manager will provide overall leadership and oversee the company's workforce authentication service function. This role reports to the Global Head of Authentication (Identity and Access Management), requires extensive background and overall experience in IAM strategy, architecture, and software development/engineering as well as subject matter expertise in authentication services (both internal workforce and customer) while ensuring appropriate visibility, communication, and governance across key business partners and stakeholders. The role will require working across organizational boundaries, managing engineering and operations teams, overseeing vendors, driving POCs and negotiations, and interfacing with audit and regulatory teams. Responsibilities: Plan and execute the delivery of Authentication services (Customer IAM). Lead & oversee the design and development of Authentication solutions that enforce applicable organization security policies and access management requirements. Lead and oversee the build, configuration, and architecture of one or more authentication platforms, such as Okta/Ping and Azure including integral technology components such as SSO (Single sign-on), registration, identity proofing, multifactor authentication, password resets, etc. Demonstrate an understanding of Authentication services and integration with broader security solutions, such as Identity & Access Governance, Privileged Access and broader Cybersecurity services. Defines, enhances, and oversees all enterprise-wide authentication processes, controls and follow-up, exception & risk acceptance approvals, and walkthroughs. Oversees the development of technical authentication solutions, engaging service owners, architects, project managers, global infrastructure teams, regional IT teams and key IAM product vendors during the lifecycle of solutions delivery. Responsible for business requirements to integrate authentication systems with in-house and third-party applications for provisioning, access requests, and certifications. Represents the IAM organization on large scale technology projects implemented outside IAM, regulatory reviews and internal and external audits. Ability to confidently articulate business risks and technical challenges to stakeholders. Be action oriented: Taking on new opportunities and tough challenges with a sense of urgency, high-energy and enthusiasm. Balance stakeholders: Anticipating and balancing the needs of multiple stakeholders. Collaborate: Building partnerships and working collaboratively within and outside ISO (Information Security Office) organization to meet shared objectives. Communicate effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences. Cultivate innovation: Creating new and better ways for the organization to be successful. Be customer focused: Building strong customer relationships and delivering customer-centric solutions. Drive engagement: Creating a climate where people are motivated to do their best to help the organization achieve its objectives. Drive results: Consistently achieving results, even under tough circumstances. Have a global perspective: Taking a broad view when approaching issues using a global lens. Be interpersonal savvy: Relating openly and comfortably with diverse groups of people. Manage complexity: Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems. Be able to optimize work processes: Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement. Be organizational savvy: Maneuvering comfortably through complex policy, process, and people-related organizational dynamics. Interpret and apply skills to build Authentication solutions to support globally dispersed businesses, personnel, and customers. Skills and Qualifications: 10+ years of overall experience in (or related experience) Cybersecurity and IAM managing engineering, strategy, process/controls and related services. 10+ years' experience in supporting key IAM business processes supporting Identity Governance, Privileged Access, Access Administration & Authentication (inc. MFA), Directory Services, Enterprise-reporting for employees, non-employees and customers. 8+ years of production support or related experience with IAM business processes, defining requirements, and implementing and recommending control-based business processes. 8+ years' experience in providing technical expertise in systems, technical infrastructure, tools, modelling, external interfaces, and other technical areas. Completes complex development, design, implementation, architecture design specification, and maintenance activities. Participating in projects and initiatives working with IAM team members, architecture, development and engineering teams, service owners, and business stakeholders to provide enterprise IAM solutions that are scalable and adaptable with the ever-changing business needs and industry demands. 8+ years' experience in Authentication products including Azure AD, Active Directory, role-based access control, multi-factor authentication, and SSO & related standards (e.g., SAML, OAUTH, NTLM, LDAP, Kerberos, PKI, etc.) is must. 8+ years' experience in engineering, production and operational support (or related experience) with PAM business processes, defining requirements, and implementing and recommending control-based business processes. Experience working with both multiple 3rd party service providers and in a third-party services agreement function during separations/divestitures. Strong interpersonal skills, with the ability to work with many levels of management and across multiple lines of business and corporate functions. 8+ years of working with regulatory requirements (SOX, SOC1, NYDFS, PCI, MAS, etc.) and industry standard frameworks and methodologies, including NIST (National Institute of Standards and Technology), Information Technology Infrastructure Library (ITIL), Systems Development Life Cycle (SDLC), etc. 8+ years working with 3rd parties providing management oversight of IAM services, technologies, processes, and controls. 8+ years' experience interpreting architecture, designs and business requirements to develop and implement IT security solutions that span multiple technologies, businesses and geographies. 8+ years advance understanding of business processes, internal control risk management, security and IT controls and related standards. 5+ years managing 20+ resources in a matrixed environment. 5+ years integrating applications and business services with IAM solutions. 5+ years of hands-on experience with platforms such as SailPoint, Okta, Ping, Quest (ARS, Change Auditor and Enterprise Reporter), Active Directory, AWS, Azure, Top Secret, ServiceNow, and related products. Experience with the following web technologies: XML, SPML/SOAP, Web and Application Servers, HTML. Demonstrated experience supporting many of the following platforms: Azure AD, OAM, ADFS, Windows, Linux, VMware, AWS, Azure, Oracle, MSSQL, MySQL, Sybase, Db2, ACF2, Tomcat, JBoss, WebSphere, WebLogic, and Apache. General knowledge of cryptography including RSA-ACE, ECC, 3DES, IDEA, AES256/1024, SEAL. 5+ years working with IaaS, SaaS, PaaS service providers (Azure, AWS, Google GCE, Salesforce). BA/BS degree in Computer Science, Engineering, or related discipline or equivalent work experience. Demonstrated experience with Databases (Oracle, MSSQL, MySQL). Experience with infrastructure, network, database, or security troubleshooting and remediation. Experience with operating system (Unix/Linux/Windows) commands and utilities as well as scripting. Experience with SIEM tool such as Splunk
At Corebridge Financial, we believe action is everything. That's why every day we partner with financial professionals and institutions to make it possible for more people to take action in their financial lives, for today and tomorrow. We align to a set of values that are the core pillars that define our culture and help bring our brand purpose to life: We are stronger as one: We collaborate across the enterprise, scale what works and act decisively for our customers and partners. We deliver on commitments: We are accountable, empower each other and go above and beyond for our stakeholders. We learn, improve and innovate: We get better each day by challenging the status quo and equipping ourselves for the future. We are inclusive: We embrace different perspectives, enabling our colleagues to make an impact and bring their whole selves to work. The Information Technology organization is the technological foundation of our business and works in collaboration with our partners from across the company. The team drives technology and digital transformation, partners with business leaders to design and execute new strategies through IT and operations services and ensures the necessary IT risk management and security measures are in place and aligned with enterprise architecture standards and principles. The VP, Authentication Governance Senior Manager will provide overall leadership and oversee the company's workforce authentication service function. This role reports to the Global Head of Authentication (Identity and Access Management), requires extensive background and overall experience in IAM strategy, architecture, and software development/engineering as well as subject matter expertise in authentication services (both internal workforce and customer) while ensuring appropriate visibility, communication, and governance across key business partners and stakeholders. The role will require working across organizational boundaries, managing engineering and operations teams, overseeing vendors, driving POCs and negotiations, and interfacing with audit and regulatory teams. Responsibilities: Plan and execute the delivery of Authentication services (Customer IAM). Lead & oversee the design and development of Authentication solutions that enforce applicable organization security policies and access management requirements. Lead and oversee the build, configuration, and architecture of one or more authentication platforms, such as Okta/Ping and Azure including integral technology components such as SSO (Single sign-on), registration, identity proofing, multifactor authentication, password resets, etc. Demonstrate an understanding of Authentication services and integration with broader security solutions, such as Identity & Access Governance, Privileged Access and broader Cybersecurity services. Defines, enhances, and oversees all enterprise-wide authentication processes, controls and follow-up, exception & risk acceptance approvals, and walkthroughs. Oversees the development of technical authentication solutions, engaging service owners, architects, project managers, global infrastructure teams, regional IT teams and key IAM product vendors during the lifecycle of solutions delivery. Responsible for business requirements to integrate authentication systems with in-house and third-party applications for provisioning, access requests, and certifications. Represents the IAM organization on large scale technology projects implemented outside IAM, regulatory reviews and internal and external audits. Ability to confidently articulate business risks and technical challenges to stakeholders. Be action oriented: Taking on new opportunities and tough challenges with a sense of urgency, high-energy and enthusiasm. Balance stakeholders: Anticipating and balancing the needs of multiple stakeholders. Collaborate: Building partnerships and working collaboratively within and outside ISO (Information Security Office) organization to meet shared objectives. Communicate effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences. Cultivate innovation: Creating new and better ways for the organization to be successful. Be customer focused: Building strong customer relationships and delivering customer-centric solutions. Drive engagement: Creating a climate where people are motivated to do their best to help the organization achieve its objectives. Drive results: Consistently achieving results, even under tough circumstances. Have a global perspective: Taking a broad view when approaching issues using a global lens. Be interpersonal savvy: Relating openly and comfortably with diverse groups of people. Manage complexity: Making sense of complex, high quantity, and sometimes contradictory information to effectively solve problems. Be able to optimize work processes: Knowing the most effective and efficient processes to get things done, with a focus on continuous improvement. Be organizational savvy: Maneuvering comfortably through complex policy, process, and people-related organizational dynamics. Interpret and apply skills to build Authentication solutions to support globally dispersed businesses, personnel, and customers. Skills and Qualifications: 10+ years of overall experience in (or related experience) Cybersecurity and IAM managing engineering, strategy, process/controls and related services. 10+ years' experience in supporting key IAM business processes supporting Identity Governance, Privileged Access, Access Administration & Authentication (inc. MFA), Directory Services, Enterprise-reporting for employees, non-employees and customers. 8+ years of production support or related experience with IAM business processes, defining requirements, and implementing and recommending control-based business processes. 8+ years' experience in providing technical expertise in systems, technical infrastructure, tools, modelling, external interfaces, and other technical areas. Completes complex development, design, implementation, architecture design specification, and maintenance activities. Participating in projects and initiatives working with IAM team members, architecture, development and engineering teams, service owners, and business stakeholders to provide enterprise IAM solutions that are scalable and adaptable with the ever-changing business needs and industry demands. 8+ years' experience in Authentication products including Azure AD, Active Directory, role-based access control, multi-factor authentication, and SSO & related standards (e.g., SAML, OAUTH, NTLM, LDAP, Kerberos, PKI, etc.) is must. 8+ years' experience in engineering, production and operational support (or related experience) with PAM business processes, defining requirements, and implementing and recommending control-based business processes. Experience working with both multiple 3rd party service providers and in a third-party services agreement function during separations/divestitures. Strong interpersonal skills, with the ability to work with many levels of management and across multiple lines of business and corporate functions. 8+ years of working with regulatory requirements (SOX, SOC1, NYDFS, PCI, MAS, etc.) and industry standard frameworks and methodologies, including NIST (National Institute of Standards and Technology), Information Technology Infrastructure Library (ITIL), Systems Development Life Cycle (SDLC), etc. 8+ years working with 3rd parties providing management oversight of IAM services, technologies, processes, and controls. 8+ years' experience interpreting architecture, designs and business requirements to develop and implement IT security solutions that span multiple technologies, businesses and geographies. 8+ years advance understanding of business processes, internal control risk management, security and IT controls and related standards. 5+ years managing 20+ resources in a matrixed environment. 5+ years integrating applications and business services with IAM solutions. 5+ years of hands-on experience with platforms such as SailPoint, Okta, Ping, Quest (ARS, Change Auditor and Enterprise Reporter), Active Directory, AWS, Azure, Top Secret, ServiceNow, and related products. Experience with the following web technologies: XML, SPML/SOAP, Web and Application Servers, HTML. Demonstrated experience supporting many of the following platforms: Azure AD, OAM, ADFS, Windows, Linux, VMware, AWS, Azure, Oracle, MSSQL, MySQL, Sybase, Db2, ACF2, Tomcat, JBoss, WebSphere, WebLogic, and Apache. General knowledge of cryptography including RSA-ACE, ECC, 3DES, IDEA, AES256/1024, SEAL. 5+ years working with IaaS, SaaS, PaaS service providers (Azure, AWS, Google GCE, Salesforce). BA/BS degree in Computer Science, Engineering, or related discipline or equivalent work experience. Demonstrated experience with Databases (Oracle, MSSQL, MySQL). Experience with infrastructure, network, database, or security troubleshooting and remediation. Experience with operating system (Unix/Linux/Windows) commands and utilities as well as scripting. Experience with SIEM tool such as Splunk