Identity and Access Management Architect

Sorry, this job was removed at 12:09 p.m. (CST) on Sunday, March 13, 2022
Find out who's hiring in Richmond, VA.
See all Cybersecurity + IT jobs in Richmond, VA
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

Job Description :

The position is described below. If you want to apply, click the Apply button at the top or bottom of this page. You'll be required to create an account or sign in to an existing one.

Need Help?

If you have a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility or call 877-891-2510 (accommodation requests only; other inquiries won't receive a response).

Regular or Temporary:
Regular

Language Fluency: English (Required)

Work Shift:
1st shift (United States of America)

Please review the following job description:

This role sits in the Cyber Security Architecture team. The role is delivery focused will focus on and support the Internal Identity and Access Management (IAM) ecosystems. This includes solutions for authentication, authorization, access, Identity Life Cycle Management (Provisioning, Deprovisioning, Identity Self Service, etc.), SSO/Federation, Privileged Access Management, Directory Services, Multifactor Authentication, and Cloud Identity.

This role will serve as the primary architecture for the internal IAM ecosystems as well as serve as an advisor / consultant to other architects as they incorporate the IAM solutions into their designs.

Successful Architects in this role must be prepared to embrace change and relentlessly pursue an intentional high bar for excellence in security practices and principles. They must support our internal clients' needs with innovative, sustainable, resilient, scalable, and secure solution. They must also iteratively improve upon the cyber solutions to meet the evolving threat landscape.

This is a senior role and operates with limited supervision; however, successful candidates must have a deep passion of collaboration and be skilled at influencing at multiple layers of the organization.

Cyber Security Architecture performs the following in support of our goals:• Derive security specifications from business requirements, and design security solutions that support core organizational functions, and assure their confidentiality, integrity and high availability.• Gain organizational commitment for security infrastructure systems and software plans, as well as assist to evaluate and select security technologies required to complete those plans. • Provide integrated infrastructure-related technical expertise across the organization, from conceptualization and project planning to the post-implementation support level. • Security Solution Architects develop security specifications, requirements and architecture artifacts in compliance with corporate standards, laws and regulations for architecture adherence and performance guidelines.
This role, specifically, will focus on and support the Internal Identity and Access Management ecosystems.

Essential Duties and Responsibilities

Following is a summary of the essential functions for this role. Other duties may be performed, both major and minor, which are not mentioned below. Specific activities may change from time to time.

1. Provide security solution expertise, requirements, and assistance to Systems Analysts, Systems Engineers, other Solutions Architects, and application development teams.

2.Confer with end-users, clients, or senior management to define security requirements for complex systems and infrastructure development.

3. Design and oversee development and implementation of end-to-end integrated security solutions and communicate needs for investing in infrastructure evolution, including analysis of cost reduction opportunities.

4. Make recommendations for improvements and/or alternatives for the company's existing solution architecture and technology portfolio.

5. Create and maintain system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards.

6. Liaison with Enterprise Architects to conduct research on emerging technologies, and recommend technologies that will provide right-sized security posture, operational efficiency, infrastructure flexibility and operational stability.

7. Mentors less experienced teammates to build their own technical expertise.

8. Demonstrate deep specialization or comprehensive knowledge in Information Security (InfoSec) technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation. This role focuses on Identity and Access Management; thus, deep understanding and experience in this area is a required.

9. Perform security reviews, identify gaps in security architecture and develop security risk management plans.

Qualifications

Required Qualifications:

The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

1. Bachelor's degree in a technical or business field, or equivalent education and related training

2. Eight years of demonstrated experience of systems engineering and/or architecture in Identity and Access Management in a medium to large corporation

3. Experienced in security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives

4. Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of finding

Preferred Qualifications:

1. Degree in a related field from an accredited program or equivalent experience

2. Experience in identity management for cloud environments (private and public) such as OpenStack/Openshift, AWS, and/or Azure strongly preferred.

3. Industry certifications in cyber security as CISSP, CISSP-ISSAP, CCSP, CISA, CISM and other related credentials preferred

4. Industry certifications in general technology (MCP, MCSE, Network+, etc)

5. Experience in identity management for cloud environments (private and public) such as OpenStack/Openshift, AWS, and/or Azure strongly preferred.

6. Industry certifications in networking, such as CCNA, CWNA, and/or Net+ preferred

Other Job Requirements / Working Conditions

Sitting

Constantly (More than 50% of the time)

Visual / Audio / Speaking

Able to access and interpret client information received from the computer and able to hear and speak with individuals in person and on the phone.

Manual Dexterity / Keyboarding

Able to work standard office equipment, including PC keyboard and mouse, copy/fax machines, and printers.

Availability

Able to work all hours scheduled, including overtime as directed by manager/supervisor and required by business need.

Travel

Minimal and up to 10%

Truist supports a diverse workforce and is an Equal Opportunity Employer who does not discriminate against individuals on the basis of race, gender, color, religion, national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Drug Free Workplace.

Thank you for your interest in Truist! BB&T and SunTrust have come together in a transformational merger of equals to create Truist, the premier financial organization in the country. You may notice references to our legacy company names, BB&T and SunTrust, in places throughout this site. All such references should be understood to refer to Truist moving forward while we continue to transition to the Truist name.

EEO is the Law Pay Transparency Nondiscrimination Provision E-Verify

More Information on DO NOT USE - Truist
DO NOT USE - Truist operates in the Fintech industry. The company is located in Charlotte, NC. DO NOT USE - Truist was founded in 2019. It has 12339 total employees. It offers perks and benefits such as Remote work program, Flexible Spending Account (FSA), Disability insurance, Dental insurance, Vision insurance and Health insurance. To see all 1 open jobs at DO NOT USE - Truist, click here.
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about DO NOT USE - TruistFind similar jobs