About the opportunity:
Cloud Security Services is seeking an experienced Operational Technology (OT) Identity & Access Management (IAM) Architect for our client. Our client requires an Operational Technology Identity & Access Management Architect to assess and document the current state architecture patterns and develop roadmaps to support the target state for its Operational Technology functions in the life sciences industry specific to Pharmaceuticals and Medical Technologies. The right candidate must have a strong background in evaluating and designing IAM architecture for large, complex, and global IAM environments, preferably including operational technology. This is a 3-month remote opportunity.
Responsibilities:
- Assess and create detailed documentation of current state (as-built) architecture patterns across Operational Technology locations and sites
- Develop a methodology and establish access control ratings for individual sites in terms of gaps with IAM policies
- Partner with sites and vendors to create target state architecture roadmaps
Required Skills:
- 10+ years’ experience working in the Identity and Access management (IAM) information security space in an architecture and engineering capacity.
- 5-7 years’ experience with the following:
- Global IAM
- Federation and single sign-on (B2B and B2C)
- National Institute of Standards and Technology (NIST) 800-53
- NIST 800-63
- NIST Cybersecurity Framework (CSF)
- Experience creating high and low level IAM architecture patterns
- Experience developing and implementing IAM strategies and roadmaps
- Purdue Model for use of OT
- Experience with major IAM platforms including:
- Microsoft Active Directory
- Azure Active Directory
- One Identity Manager
- Ping Federate
- Ability to navigate the organizational structure of a large enterprise and facilitate discussions across domains
- Ability to evaluate and incorporate vendor release schedules into roadmaps
- Ability to work as liaison between business and information security/information technology
- A solid understanding of access control patterns including role-based access control (RBAC) and attribute-based access control (ABAC)
- Experience consulting on all phases of a full IAM lifecycle including
- Book of record (BoR) to identity management system (IDMS) identity feeds.
- IDMS to directory and application identity provisioning.
- Application consumption of identity
- Strong written and verbal communication skills
- Supporting communication of IAM efforts to all levels of an organization including C-Level
- Experience with IAM governance including
- Information security policies and procedures
- User lifecycle management (provisioning, de-provisioning and maintenance)
- User and access recertification
- Ability to interpret and leverage existing documentation
- Excellent analytical skills
- Collaborative team worker – both in person and virtually using MS Teams or similar
- Excellent documentation skills; demonstrated proficiency in Microsoft Office including Word, Excel and PowerPoint
- Flexibility to accommodate working across different time zones
- Excellent interpersonal communication skills with strong spoken and written English
- Business outcomes mindset
- Solid balance of strategic thinking with detail orientation
- Self-starter, ability to take initiative
- Project management and organizational skills with attention to detail
Preferred Skills:
- Operational technology IAM experience
- Life sciences industry experience
Education:
- BS in Computer Science, Mathematics or related field of study, or equivalent work experience.
Preferred Education:
- Related certifications (i.e., Data Analyst; Business Analyst)
About Us:
Cloud Security Services is an IT professional services company that assists mid-to-large enterprises with the implementation of secure IT environments that span on-premises and public cloud platforms. Be a part of a fast-paced, growing organization focused on doing great projects for great people.
EEO Statement:
Cloud Security Services is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, marital status, national origin, genetics, disability, age, or veteran status.
Top Skills
What We Do
We are a team of experts in cybersecurity, who specialize in protecting information assets against threats, both from inside the organization and outside.
We partner with your organization to understand your specific concerns and craft a cybersecurity strategy designed specifically for your business and your specific needs.
All of our experts come with 15+ years of information risk management experience in the Fortune 500 space. You can count on us to guide you throughout the process, and help you with your cybersecurity concerns.
Our specialty includes
- Cybersecurity
- Zero Trust
- Perimeter-less Security
- Workforce Identity and Access Management
- Consumer/Customer Identity and Access Management.