The Ideal Candidate
We are searching for a dynamic, tech-savvy individual with a proactive mindset to tackle diverse IT Security projects. This person should have a strong aptitude for learning new business processes, excellent relationship-building skills with both business users and management, and the ability to discern effective strategies from ineffective ones. Collaboration with global IT teams to propose innovative and appropriate solutions is essential.
Key Responsibilities
- Serve as an enterprise security architect with expertise in Identity and Access Management (IAM) and zero trust frameworks.
- Collaborate with enterprise architecture and product teams to create secure identity and access management solutions on hybrid technology platforms, meeting business, security, and regulatory requirements.
- Act as a subject matter expert for various business units, technical forums, internal and external auditors, senior management, and business stakeholders.
- Identify opportunities for improvement in design practices and implementation strategies.
- Act as a knowledgeable technologist and a natural collaborator across diverse business and technical teams.
- Research, design, and implement advanced security solutions and practices.
- Manage project priorities, deadlines, and deliverables with efficiency and precision.
- Work with global technology teams to ensure the timely application of security designs and implementations.
- Contribute to strategic discussions on improvement opportunities across the organization.
- Ensure security and privacy are embedded in system design and implementation processes.
Qualifications and Skills
Educational Background
- A degree in Computer Science, Computer Engineering, Network & Telecommunications, Information Technology, or related fields.
Experience
- 8+ years of relevant professional experience.
Certifications
- Preferred certifications include CISSP, CISM, CISA, CEH, GIAC, or other recognized security credentials.
Technical Expertise
- At least 3+ years of experience in Identity and Access Management (IAM) within enterprise environments.
- Proficiency in cloud-based IAM solutions and experience with Okta integration.
- Advanced knowledge of technologies like Identity Federation, OAuth, SAML, Single Sign-On (SSO), Active Directory, Privileged Access Management (PAM), Role-Based Access Control (RBAC), and Identity Governance.
- Strong understanding of encryption techniques, Public Key Infrastructure (PKI), and security architecture principles.
- Familiarity with security product implementations, risk management frameworks, threat modeling, and vulnerability mitigation.
- Experience with cybersecurity tools like Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), and Secure Software Development Life Cycle (SSDLC) frameworks (e.g., OWASP).
- Knowledge of compliance standards and frameworks like ISO 27001, COBIT, ITIL, GDPR, PCI DSS, China MLPS, CBDT, and PIPL.
- Strong documentation skills, including writing SOPs, taking meeting minutes, and creating architectural designs.
Core Competencies
- Results-driven with the ability to translate business goals into actionable tasks.
- Effective team player capable of working with diverse stakeholders to achieve security objectives.
- Quick learner, adaptable to changing technologies and environments.
- Strong understanding of current IT trends and solutions.
- Self-starter who can work independently and handle responsibilities effectively.
Working Conditions
- May require extended hours or on-call support depending on project needs.