Posted in Other 30+ days ago.
Job Summary
Work in Chief Information Security Officer (CISO) office responsible for the planning, architecting, building, delivery and support of the Identity and Access Management (IAM) program. This position will provide direction and guidance to the development, specifications, and communications of the IAM application and architecture, as well as provide in-depth technical consultation to the business units and IT management and assist in developing plans and direction for the integration of information security requirements.
Responsibilities
Develop, deploy and maintain an Identity and Access Management (IAM) solutions that enable the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
Maintain and expand core IAM capabilities that improve security, increase operational efficiency and enable business.
Aligns IAM processes across the organization and develops and documents standards for organizational use. Co-leads an IAM selection process, evaluates existing and emerging technologies and tools in the selection of an IAM service offering for the business units.
Actively participate in a product team and work with business and engineering team to articulate security requirements in a way that leads to the secure creation and enhancement of the identity security product.
Ensure products are built and sustained with security and compliance by design.
Influence and communicate effectively with non-technical audiences including senior product and business management.
Define high-level migration plans to address the gaps between the current and future state. Define high-level migration plans to address the gaps between the current and future state
Drive security as an integrated component in digital product success by collaborating closely with product delivery teams.
Develops product strategies, vision and roadmaps that align with the architecture and technology direction of the business unit, consistent with enterprise priorities as agreed with product-line management.
Embeds with product teams as needed to ensure full transparency and no surprises, keeping product stakeholders up to date with the latest on delivery status, product security risks and scope changes.
Track developments and changes in the digital business and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts.
Evaluates new products, methods, and technologies to protect against existing and emerging security threats.
Act as the communicator of the vision to translate the product strategy and vision developed with business stakeholders into what the product team must bear in mind to ensure security and compliance are embedded
Review security technologies, tools and services, and make recommendations.
Secure identities in M356 using Multifactor Authentication, conditional access, and Azure AD Privileged Identity Management (PIM)
Work across the company to drive adoption of technical standards, design principles and architecture patterns
Have excellent communication skills (written and verbal). Demonstrate strong problem-solving ability and analytical skills. Strong business acumen and a commitment to integrity, process improvement and customer satisfaction
Persuasive in influencing strategic security architecture direction, framing reference architectures and pattern components, specifying policies and standards, drive consensus on target state architectures, and influence roadmaps
Knowledge and Experience
Bachelor's degree in Computer Science, Engineering or related field or equivalent work experience
CISSP, CCSP, CISM, TOGAF or other security and/or Enterprise Architecture methodology certifications.
At least 12 years of related IT security and Identity Security Architecture experience
Identity management familiarity in one or more of the following areas: single sign-on (SSO), data management, identity federation, Multifactor Authentication, Cloud identity, enterprise directory architecture and design, including directory schema, directory services, namespace and replication topology experience, resource provisioning, and process integration. Identity and access governance includes role-based access control, access request and certification, user life cycle management processes, and organizational change management.
Experience with administrating authentication technologies, such as Microsoft Active Directory/Windows authentication, OpenLDAP, Kerberos, OpenID Connect, OAuth, and federated identity management.
Basic familiarity with the principles of design thinking, and lean and agile software delivery
Strong understanding of Secure Software Development Lifecycle (S-SDLC) and identity in cloud (Azure, Google , Amazon)
Knowledge of healthcare industry and industry related technology a strong plus
General understanding and familiarity with protecting against web and web services security vulnerabilities including the OWASP Top Ten SANS Top Twenty-Five
Experience in designing, architecting, and implementing complex enterprise applications, infrastructures with security built in
Fundamental working knowledge of industry-standard enterprise architecture models (e.g. TOGAF, NIST.SP.800-53r4, ISO 27002, SABSA, HIPAA, HITECH, PCI-DSS) and such security frameworks
Additional Information
Pfizer |
Pfizer |
RetailData |