Job Actions

Job Information

Iam Engineer
Category: Other
  • Your pay will be discussed at your interview

Job code: lhw-e0-89772173

Company Profile

Western and Southern Financial Group

Contact Company

Local Information

Laugh while you Look

Sponsored Ads


  Job posted:   Thu May 17, 2018
  Distance to work:   ? miles
  1 Views, 0 Applications  
Iam Engineer

Iam Engineer

+ About Us

+ Community Impact

+ Working in Cincinnati

+ Benefits

+ Search All Jobs

Create a ProfileLog In


Show Details

Apply Now

Or apply with these other sources

Apply with LinkedIn

Terms of use

Refer Job:


+ Add to Saved Jobs


Business/Operating Units:

Information Technology



Reports to (title):

Senior Security Strategist - IAM


Information Security

Employment Status:


Summary of Responsibilities:

Works closely with the Senior Security Strategist to build and deliver the future state Identity and Access Management (IAM) strategy for the Enterprise. Helps define the future state vision for how identities, and the access assigned to those identities, will be managed, enforced and reported upon across all parts of the business and related IT assets. Drives the technical delivery of IAM components required to support the future state IAM architecture. Participates as a consultant to IT project teams and application development teams to assist in the evaluation and design of their IAM needs. Works with minimal oversight and is responsible to make an established range of decisions, escalating when necessary and updating the Senior Security Strategist on a regular basis.

Position Responsibilities:

+ Leads technical efforts in the maintenance and execution of a multiyear IAM strategic plan that is aligned with business priorities, industry best practices and the Enterprise Information Security strategic plan under the guidance of the Senior Security Strategist.

+ Executes projects on the IAM strategic plan from concept through closure ensuring major project activities, milestones and deliverables are planned/tracked, and that progress is accurately reported using standard project management instrumentation. Makes certain the development of IAM project requirements (functional and nonfunctional) are taking place to effectively meet or exceed business requirements and customer expectations. Requires visual acuity to read a variety of correspondence, reports and forms, and to prepare and analyze data in an accurate, neat and thorough manner.

+ Evaluates, recommends and implements the IAM products and services required to support the future state needs of the IAM program, which includes directory services (e.g., AD), identity federation (e.g., SAML, SSO and ADFS), Multi-Factor Authentication (MFA), and Identity Management (IdM).

+ Conducts in-depth research to understand industry best practices, emerging trends and the latest open source methods to help design and deliver high-quality IAM solutions that may help address current challenges or enable new ways of doing business.

+ Develops and implements scalable access management, role management, access certification, user provisioning and password management systems for internal (associate) and external (customer, producer and bank channel) identities.

+ Works closely with project and application development teams to serve as a technical advisor and consultant to conceptualize, design and implement IAM solutions that meet their stated business objectives.

+ Provides guidance on the technical aspects of IAM integration, ensuring that relevant technical strategies, policies and practices are applied consistently.

+ Identifies opportunities for automation and standardization when needed for the user lifecycle provisioning process (requesting, approving, implementing and auditing user access).

+ Helps continually assess and identify the root cause of any Internal Audit issues, ensuring that plans to resolve issues follow best practices and are implemented in a timely manner.

+ Performs other duties as assigned by management.

Selection Criteria:

+ Demonstrated substantial experience practicing in the areas of: identity and access management, provisioning and de-provisioning, password management/synchronization, authentication, authorization and single sign-on or commensurate experience.

+ Proven experience in delivering comprehensive Identity and Access Management projects.

+ Proven ability to identify project risks and gaps, developing creative and workable solutions to complex problems and policy issues.

+ Demonstrated strong analytical and problem-solving skills with the ability to grasp new concepts and apply them.

+ Proven ability to work under multiple deadlines and with minimal supervision.

+ Demonstrated ability to understand and analyze customer requirements and provide appropriate solutions.

+ Proven strong communication and documentation skills.

+ Demonstrated calm and professional demeanor when handling demanding situations.

+ Proven ability to work with multiple stakeholders to provide direction and oversight.

+ Proven experience in completing assigned tasks accurately and on a timely basis.

Work Setting:

+ Works in an office setting and remains in a stationary position for long periods of time while working at a desk, on a computer or with other standard office equipment or while in meetings.

+ Requires visual acuity to read a variety of correspondence, reports and forms, and to prepare and analyze data in an accurate, neat and thorough manner.

+ Continuously makes repetitive motions of the wrists, hands and/or fingers.

Educational Requirements:

+ Bachelor's degree with five years professional experience in Information Security (additional years considered in lieu of degree).

Computer Skills and Knowledge of Hardware & Software Required:

+ Proven experience with one or more Identity and Access Management (IAM) solutions such as NetIQ Identity Vault, Oracle Identity Manager, SailPoint Identity Governance, etc.

+ Proven experience in Identity & Access Governance, including Role Based Access Control (RBAC), access request and certification.

+ Strong understanding of directory services (Active Directory, LDAP, eDirectory).

+ Strong understanding of Federation, SSO, SAML, OAuth, PKI, and Identity Governance and Administration (IGA) technologies.

+ Strong understanding IAM frameworks, practices, systems and controls.

+ Knowledge of Privileged Access Management solutions.

+ Knowledge of Multi-Factor Authentication (MFA) solutions and technologies.

Certifications & Licenses (i.e., Series 6 & 63, CPA, etc.):

+ Candidate encouraged to hold one or more of the following security certifications: Certified Information Systems Security Professional (CISSP), any GIAC certification or ISACA certifications.

Position Demands:

+ Extended hours required during peak workloads or special projects and off-hour support.

+ Occasional travel may be required by car or plane.


More Information »