Establish that your organization implements, upgrades and updates applications; meets with managers and users to identify needs and determine functional and process requirements; prepares specifications and justification for new and enhanced enterprise level business application modifications.
Secure that your organization collects and analyzes the projects information requirements and transferring the same knowledge to development team and prepares estimates for projects assigned.
Provide expert technical consulting and support for security issues requiring unique and complex problem solving in creative effective ways which have a broad impact on the business.
Provide technical leadership and strategic direction for the technologies, standards, processes and architecture for data across the enterprise.
Develop, design and update an RBAC model to meet the needs of the roles and organizations and update as new operational requirements dictate.
Secure that your organization maintains awareness of current trends in information technology and performs varied research and periodical searches to identify current trends in information systems, hardware, software, and training.
Help establish new and update existing security standards and programming practices for internal service development and service security operational processes.
Manage work with cross functional teams to develop and maintain RBAC policies, enterprise roles and permissions sets in your various applications.
Analyze and evaluate existing control processes, data flows and integration points, and determine appropriate access management technology, process and people improvement suggestions.
Drive the execution of new technical innovation initiatives using a combination of prototyping, modeling, financial analysis, incubation or business development capabilities.
Lead business and functional team meetings to represent the business consulting team and to help business team with technical feasibility around Identity and Access Management.
Be accountable for serving as technical advisor for system architecture and administration and provide technical support to complex systems design and development projects.
Be accountable for identifying, prioritizing, and implementing security related requirements, and enabling project teams to deliver secure IT solutions through effective risk management and threat modeling.
Assure your organization understands mechanical process of creating reports in IAM systems and create reports and metrics on key metrics related to data issues, data quality.
Ensure you listen; lead and manage technology innovation projects through all milestones from early concept through handover to development, ensuring timely completion of all innovation deliverables.
Pilot: partner with the system owners, audit, and compliance stakeholders to support the management of access management risks and compliance requirements across your organization.
Manage the infrastructure teams operational and strategic planning to achieve business outcomes through proper planning, collaboration, negotiation, and execution, with internal and external partners and stakeholders.
Be accountable for working closely with Architects, Developers, Product Managers and Program Managers; and provide support to Identity and Access Management (IAM) leadership to ensure strategy aligns with the business values and direction of the enterprise.
Pilot: work alongside iam architecture and project team to perform analysis and configuration based fixes and minor enhancements to enhance identity and access management solutions.
Organize: partner with appropriate application, security and other teams to support a solid devsecops capability for the core infrastructure services.
Be accountable for participating in enterprise level projects to refine roles based access control (RBAC), platform integrations, and continuous improvement of the iam platform.
Establish that your organization methods and techniques of preparing system specifications, and preparing test data, and in evaluating business requirements and developing information systems solutions.
Govern: partner with internal teams to ensure successful security and compliance programs that align with client and regulatory compliance requirements.
Install, customize, configure, and support identity provisioning and governance tools manage source code and builds for compliance reporting.
Confirm you enlighten; lead architectural considerations to ensure solutions are designed for successful deployment, security, and high availability in the cloud.
Provide technical guidance on disruptive technologies and grey areas, identify solution and technology pain points, and resolve conflict.