Develop and execute a comprehensive identity management strategy that supports organizational goals and regulatory compliance, engaging Identity & Access Management (IAM) leadership in strategic direction setting.
Oversee user provisioning, deprovisioning, and identity governance processes to ensure secure and efficient operations.
Lead the deployment and management of identity management platforms, including Identity Governance and Administration (IGA) tools, Client IAM tools, and Operations tools.
Evaluate and prioritize risks in new and existing systems from both business and technology perspectives, recommending controls that balance effectiveness with business impact.
Leverage relationships to act as a liaison between IAM and business units, fostering collaboration to implement best risk management practices.
Influence enterprise buy-in to address risk areas and promote a more information risk-aware culture.
Responsible for selection and prioritization of IM projects, oversight of IM budget management, and long-range planning.
Develop and mentor a high-performing technical IAM team, setting standards for engineering excellence, documentation, runbooks, and on-call readiness.
Own and mature workforce and client identity for all internal and external users and applications, including strategic design and hands-on implementation of IAM patterns.
Create and track IAM KPIs and OKRs tied to business outcomes.
Requirements
12+ years in identity management, with 5+ years in a leadership role within a large-scale enterprise environment.
Proficiency in identity management technologies, including Active Directory, IGA tools, and federated identity solutions.
Requires substantial prior hands-on engineering experience designing and implementing IAM solutions (e.g., JML, Access Certifications, Identity Verification, RBAC), with a clear progression from senior engineer/architect into strategic leadership.
Bachelor’s degree in Cybersecurity, Computer Science, Information Systems, or equivalent work experience.
Certification in security space desired (CISSP, CCSP, etc).
Tech Stack
Cyber Security
Benefits
We believe in fairness and transparency. It’s why we share the salary range for most of our roles. However, final salaries are based on a number of factors, including the skills and experience of the candidate; the current market; location of the candidate; and other factors uncovered in the hiring process. The standard pay structure is listed but if you’re living in California, New York City or other eligible location, geographic specific pay structures, compensation and benefits could be applicable, click here to learn more.