Identity and Access Management IGA Governance Lead
Bank of America
Job Description:
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. Responsible Growth is how we run our company and how we deliver for our clients, teammates, communities and shareholders every day.
One of the keys to driving Responsible Growth is being a great place to work for our teammates around the world. We’re devoted to being a diverse and inclusive workplace for everyone. We hire individuals with a broad range of backgrounds and experiences and invest heavily in our teammates and their families by offering competitive benefits to support their physical, emotional, and financial well-being.
Bank of America believes both in the importance of working together and offering flexibility to our employees. We use a multi-faceted approach for flexibility, depending on the various roles in our organization.
Working at Bank of America will give you a great career with opportunities to learn, grow and make an impact, along with the power to make a difference. Join us!
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements
Role Description:
The IAM Role Based Access & Segregation of Duties Manager is a senior leader of the Identity and Access Management team. This person should have a vision for how to best leverage technologies and processes to protect our data and systems, while allowing our business partners to move quickly and securely by automating identity life cycle, access provisioning/deprovisioning, and will plan and execute at a strategic level, lead, and influence resources with other teams and organizations.
The team reporting to this leader provides consulting, subject matter expertise, control management, risk mitigation, product direction, and oversight for the entire Identity Governance and Administration (IGA) ecosystem related to role-based access, identity attributes, policy-based access, and segregations of duty for all lines of business including Information Technology. The person in this role will provide leadership by working closely with cross-functional teams, operations, product management, architecture, engineering teams, project managers, and analysts, partnering with stakeholders across the LOBs, and GIS leadership.
The candidate for this role possesses in-depth IGA expertise, operational savvy, business and technical acumen, and a track record of enabling the business while reducing risk. This individual will utilize their in-depth IGA knowledge as well as new business requirements to design and direct secure solutions that meet the organization’s evolving needs. This individual also exercises independent judgment in directing staff to achieve results and works independently with direction from the Information Security IAM Executive.
An advocate and leader reinforcing the need for restricting permission assignment to users and birthright access application through hands on support activities.
Leads the team in providing tool and process support on bundle creation and maintenance.
Connects with First Line of Defense on product pain points and recommends product and capability improvements.
Respond to audit and regulatory requests as needed.
Work closely with Cybersecurity, audit, compliance, legal, and stakeholders to define access policies, user roles, and access control procedures for our diverse technology and lines of business landscape.
Ensure the team coordinates with Governance services on new or changing controls and executes accordingly.
Establishes a framework of policies and technologies as it relates to role and attribute-based access controls through collaboration with FLU, Technology, Product, and Architecture. Advises on access model best practices by acting as SME.
Support the team members by providing technical guidance as well as assist other on-going engagements for resolving critical issues.
Investigate and troubleshoot complex technical issues, perform root-cause analysis for high severity issues, and provide permanent resolution.
Work with technology vendors as appropriate to resolve product issues, technology evaluations, and design reviews.
Meets demands of managing multiple work streams, communicating effectively with senior technology and business leadership, and demonstrate experience leading large and complex projects and global programs.
Assess and advise on modernizing IAM capabilities and methodologies, including development of strategies, readiness assessment, development of training and communications.
Operate as an advisor for our distributed IAM teams to help them to elect the best solution for resolving the identified / possible technical issues or security threats in the system / infrastructure.
Harness familiarity with IT security and risk management practices on risk mitigants.
Required Qualifications:
10+ years experience in IAM working on complex projects and programs
Strong interpersonal and influencing skills
Excellent organizational skills, able to manage multiple work streams simultaneously and respond to rapidly changing demands
Demonstrated experience working with frequently-utilized IAM vendor solutions such as SailPoint, Savyint, ForgeRock, Ping, Okta, Varonis, and CyberArk in large enterprises for the purpose of governing security.
Experience in configuring and deployment of Single Sign On and MFA solutions, IGA solutions, and PAM Solutions
Hands-on on WAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts
Desired Qualifications:
Good knowledge of Web / Application servers (e.g. IIS, WebSphere, WebLogic, JBoss, and Apache etc.)
Strong technical knowledge of authentication and authorization including Authz and Authn, OIDC, SAML, XACML, LDAP, OAuth, OpenID
Experience working on various operating systems such as Windows, Linux, Solaris etc.
Working knowledge on Databases such as MS SQL, Oracle, mySQL
Good understanding or hands-on experience on JSON, REST and SOAP
Advanced knowledge of cloud platforms (AWS, Azure, GCP etc.) experience in deploying and managing AM solutions on cloud platforms. AWS is preferred
Deep knowledge and experience working with technology infrastructure including Windows, Active Directory, LDAP, Unix/Linux, databases, authentication protocols, and containers
This job will be open and accepting applications for a minimum of seven days from the date it was posted.
Shift:
1st shift (United States of America)Hours Per Week:
40