Job Purpose
Lead and oversee Identity and Access Management (IAM) initiatives for both IT and OT environments. The IAM Senior Manager in Information Security optimizes and manages identities and access for individuals and entities by implementing identification, authentication, authorization, permissions, and privileged access controls. This includes overseeing Bring Your Own Device (BYOD) policies, access rights, and user account systems and processes. The role ensures strict enforcement of cybersecurity standards and compliance while safeguarding data protection and managing privileged access.
Position Accountability Description
Strategic Leadership
- 1. Develop and implement a strategic IAM (Identity and Access Management) roadmap aligned with the organization's cybersecurity goals, ensuring robust access control and cybersecurity measures across all systems and applications.
- 2. Oversee daily operations by managing team activities, resolving issues, and ensuring adherence to IAM policies, ensuring smooth and efficient departmental functioning.
- 3. Establish and monitor key performance indicators (KPIs) to measure the effectiveness of IAM processes and drive continuous improvement in access control, compliance, and cybersecurity.
Operational Excellence
- 4. Manage daily operations by overseeing team activities related to IAM, resolving issues, and ensuring adherence to policies, thereby maintaining smooth and efficient departmental functioning and minimizing disruptions.
- 5. Monitor and evaluate user provisioning processes and access request workshops, ensuring timely and accurate execution, and reducing the risk of errors or unauthorized access, thus optimizing operational efficiency.
- 6. Lead the regular review and update of access control policies and procedures, ensuring they remain aligned with industry best practices and organizational needs, to maintain a robust and efficient IAM framework.
- 7. Lead ongoing access reviews and certifications, ensuring that permissions and access rights are correctly aligned with current roles and responsibilities, reducing unnecessary access and improving overall system cybersecurity.
- 8. Manage the optimization of IAM technologies and tools by staying informed about the latest industry trends and integrating advanced solutions to enhance operational efficiency, cybersecurity, and user experience.
- 9. Guide the definition, establishment and maintenance the Identity and Access Management solutions.
- 10. Manage and execute identities and roles based on approved Segregation of duties (SoD) business Matrix.
- 11. Oversee Identity Governance and Administration (IGA) by ensuring the implementation and maintenance of effective policies, procedures, and technologies that manage user identities, roles, and access rights across the organization. Ensure compliance with regulatory requirements and internal cybersecurity standards while optimizing the lifecycle of user access.
- 12. Manage ERP Governance, Risk, and Compliance (GRC) access controls by implementing and monitoring cybersecurity measures that safeguard sensitive enterprise resource planning (ERP) systems. This includes defining user roles, enforcing segregation of duties, and ensuring alignment with corporate governance policies to mitigate risk.
Stakeholder Management
- 20. Build and maintain strong relationships with internal and external stakeholders, including IT, cybersecurity, and compliance teams, to ensure effective collaboration on IAM initiatives.
- 21. Collaborate with vendors and service providers to ensure IAM solutions meet organizational requirements and industry standards.
Team Leadership and Development
- 22. Lead and mentor a team of IAM professionals, fostering a culture of accountability, innovation, and continuous improvement within the team.
- 23. Conduct regular performance reviews, providing constructive feedback to support the professional growth of team members and encourage continuous learning and improvement.
Financial Management
- 24. Control, develop and manage the unit’s budgets and monitor expenditures, identifying cost-saving opportunities and making necessary adjustments to ensure financial accountability and resource optimization.
Compliance and Best Practices
- 25. Ensure that all IAM practices comply with relevant regulatory requirements and industry standards, developing and enforcing policies and procedures to maintain compliance and data integrity.
- 26. Oversee incident response efforts for any IAM-related cybersecurity breaches, coordinating with technical teams to resolve issues quickly and minimize operational impact.
- 27. Approve and enforce IAM lifecycle management policies, ensuring proper management of identities and access controls throughout their lifecycle.
Innovation and Continuous Improvement
- 28. Drive continuous improvement initiatives for IAM processes and technologies, staying informed about the latest industry trends and best practices to maintain a competitive edge.
- 29. Evaluate emerging IAM technologies, conducting feasibility studies and pilot programs to assess potential benefits and risks before full implementation.
- 30. Foster a culture of innovation and continuous training by encouraging team members to propose and implement new ideas for enhancing IAM practices and improving overall cybersecurity and efficiency.
Minimum Job Requirements
- Education Background: Bachelor’s degree: Information Security and IAM, or equivalent
- Relevant Experience: Minimum 8 years of total experience in identity and access management (IAM), with a strong background in access control, multi-factor authentication, and cybersecurity policy development, combined with practical experience in incident response and system monitoring.
- Professional Licenses, Accreditations & Certifications Preferred: Certified Information Systems Security Professional (CISSP) or Certified Identity and Access Manager (CIAM) or equivalent certifications in IAM or cybersecurity.