Access Management Resume Samples

4.8 (54 votes) for Access Management Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the access management job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
KG
K Glover
Keshaun
Glover
6442 Rudolph Causeway
Boston
MA
+1 (555) 767 5373
6442 Rudolph Causeway
Boston
MA
Phone
p +1 (555) 767 5373
Experience Experience
11/2016 present
Los Angeles, CA
Senior Director, Offnet Access Management
Los Angeles, CA
Senior Director, Offnet Access Management
11/2016 present
Los Angeles, CA
Senior Director, Offnet Access Management
11/2016 present
  • Manage Off-Net presale quoting team to support the company by sourcing network capacity via off-net vendors
  • Assists with the development of channel communications for all audiences (corporate and field)
  • Assist in the selection qualification of off-net access suppliers, negotiating agreements and managing the high level strategic relations
  • Seeks out new approaches to improving sales effectiveness and efficiency, including the use of technology, tools, process and talent management
  • Audit existing off-net solution providers to maximize efficiencies and cost savings opportunities
  • Formulates execution approaches and oversees the implementation of initiatives with minimal disruption to BAU field operations
  • Communicates persuasively and effectively with the executive team and internal partners (e.g. Marketing, Finance, IT, Legal etc.)
09/2012 07/2016
Los Angeles, CA
Director Access Management & Applied Cryptography
Los Angeles, CA
Director Access Management & Applied Cryptography
09/2012 07/2016
Los Angeles, CA
Director Access Management & Applied Cryptography
09/2012 07/2016
  • Provide management leadership to the team members under IAM and Applied Cryptography
  • Actively participate in the development of IAM Strategy and strategic planning of IAM Program(s)
  • Manage the team's financials, specifically – resource forecast in VFM, travel/training
  • Flexibility to work after hours and weekends to accommodate and support the existing servers/applications maintenance windows
  • Drive team members toward achieving the team goals – "beyond the normal BAU" – this includes process improvement and risk reduction initiatives
  • Develop detailed IAM program metrics for reporting to senior management and key business stakeholders
  • Establish continuous monitoring of performance metrics and leverage metrics to drive process improvements
05/2009 08/2012
Phoenix, AZ
Global Access Management
Phoenix, AZ
Global Access Management
05/2009 08/2012
Phoenix, AZ
Global Access Management
05/2009 08/2012
  • Implement automation solutions to improve operational processes, including scripting and enhancements to existing workflows
  • Adhere to standards as defined, identifying and recommending improvements as necessary
  • Provide technical support for STEALTHBITS technologies and any other technology tools to enhance Access Management service delivery, self-service initiatives, and reporting
  • Understand, define, and implement Self-Service portals that will empower the business to action tasks, reducing Global Access Management manual efforts
  • Implement policies, standards, and processes for all aspects of Global Access Management Operations
  • Team/People Management
  • Track record of delivering to deadline and budget
Education Education
Bachelor’s Degree in Business Administration
Bachelor’s Degree in Business Administration
Kaplan University
Bachelor’s Degree in Business Administration
Skills Skills
  • Able to create challenging roles to build organizational capability and fill gaps
  • �Champion access management processes and procedures throughout the business
  • Influence customer and/or organizational leadership through effective listening and communication to accomplish objectives
  • Monitor key performance indicators to improve the flow of access requests
  • Generate and lead formal and/or informal presentations to customers and project team members
  • Apply expertise to achieve financial and operational objectives
  • Lead teams supporting enterprise system access request fulfillment
Create a Resume in Minutes

15 Access Management resume templates

1

IT Manager / Access Management Resume Examples & Samples

  • Oversight of business-as-usual activities of the TRMIS-AMG Access Control Area, including
  • Working with the area owners to implement new processes (when required),
  • Ensuring processes are executed and documentation are kept current
  • Oversight of end-to-end processes for the TRMIS-AMG business applications focusing on
  • Problem management
  • Working closely with CSTS support partners
  • Signoff for changes prior to implementation
  • Oversight of end-to-end TRMIS-AMG managed attestation processes
  • DIAMOND attestation creation
  • First level support for attestation issues AOR/DIAMOND/Application Ownership
  • DIAMOND landing page updates and maintenance
  • Business-as-usual processes around attestation
  • Responsible for TRMIS-AMG Access Controls
  • Audits of C16 manage access process
  • Daily HIRT checks
  • Implementation of new controls and processes
  • DIAMOND Data Exception Escalation
  • Coach other team members in audit controls, problem analysis and solutions
  • Periodic review of processes to ensure risks are identified and mitigated
  • Relationship Management with CSTS support partners, TRMIS Business Technology Risk Management Teams, HR, as well as Access Services teams
2

VP-access Management Resume Examples & Samples

  • Maintain operational oversight of managed service provider performing Breakglass & Temporary Privileged Access Service
  • Cultivate the mindset of continuous improvement within the team to rigorously eliminate inefficiencies
  • Contagious enthusiasm fueled by a desire to be best in class
  • Client focused and biased in pursuit of business goals and objectives
  • Consistently sets new standard for outstanding customer service
  • Natural formal and informal communicator
  • An extreme high bar for success and a continuous improvement mindset
  • Unwillingness to accept status quo and a passion for driving transformational change
  • Ability to quickly get to the facts and to identify the root cause of problems across disciplines
  • Able to influence peers in a manner that fosters partnership and customer services with skills to deliver results
  • Avid consumer of technology and posses a thorough understanding of the value of technology
  • Risk minded and aware; able to mange risk in balance with capability and quality
  • Innovative and prepared to try different ideas where this could be beneficial to the environment and our clients
  • Minimum 7 years combined line or delivery experience in a financial institution or comparably large organization
  • Minimum 3 years overall IT Security or Access Management Experience across different infrastructure platforms; Windows, UNIX, Mainframe and Database
  • Subject Matter Expertise on IT Security concepts, policies, and controls within a financial institution. Knowledgeable on SOX Controls
  • Demonstrated experience with engaging Auditors and Regulators
  • Demonstrated expertise in developing and managing successfully customer service functions in financial institutions
  • Demonstrated expertise in managing large infrastructure organizations (estate size and/or staff)
  • Demonstrated expertise in governing 3rd party Managed Service Providers
  • Experience in building and developing staff
  • Experience in building and leveraging personal networks to influence peers on behalf of the client
  • Experience in managing transformational change programs across people, process and technology disciplines
  • Mature understanding of financial markets and fundamental business principles and drivers
3

Assoc Director, ID & Access Management Resume Examples & Samples

  • Work with peer IT organizations to understand technical and functional requirements for integrating IdM requirements and solutions into IT application support and operational support services as well as within defined architectural patterns
  • Support and execute the strategy for IdM services that are robust and scalable to support the The Coca-Cola System (TCCS) – including employees, bottlers, contingent workforce, suppliers and external business partners
  • Plan, execute, control, complete, operate and support approved IdM projects or project deliverables (as approved via SDLC methodology) to meet committed scope, functionality, timeline, budget, and quality, while also ensuring that delivered IdM solutions create a positive user experience
  • Provide measurably effective 24x7x365 operational support of IdM services to TCCS. This will require occasional off-hours support to address service impairments, pressing system issues or scheduled deployments
  • Define metrics to report work progress to senior management
  • Work with business partners from corporate audit, controller’s office and strategic security to understand and deliver on business requirements, especially as they pertain to Sarbanes-Oxley (S-Ox), Payment Card Industry Data Security Standards (PCI DSS) and broad-ranging international privacy regulations
  • 6+ years of experience in application security leadership role
  • 5+ years of experience providing application and/or infrastructure IT services in an operational capacity
  • Demonstrated experience working on application access security and IdM for SAP, CA, CyberArk, RSA and other relevant technologies, applications and solutions
  • Proven experience in enterprise IdM integration, cloud computing, enterprise mobility, service oriented architecture, and delivering innovative solutions
  • Ability to work effectively and efficiently both individually and in a team environment operating in a fast, complex environment that is constantly changing
  • Comfortable and adept in dealing with ambiguity
  • Ability to identify, document and gain senior management and peer support for IdM programs, including strong verbal and written communication skills
4

Access Management Lead Resume Examples & Samples

  • Help demonstrate Facebook’s commitment to security within the company
  • Establish a shared access management vision by leading through influence
  • Build, maintain, and execute on a time bound road-map considering short, medium, and long term access management needs
  • Understand technical implementation details necessary to manage access to internal and external tools
  • Interpret access management needs and translate them into technical and operational requirements
  • Continuously assess and drive improvements of internal Facebook tools, technical capabilities, and business processes to improve technical enforcement of access management and enforcement principals by working with business and software engineering partners
  • Understand and help define the security policies and needs to effectively uphold access management commitments
  • Evaluate and design operational management processes and procedures to effectively and efficiently provision access to internal tools and data
  • Establish a data driven approach to define, analyze, and report on metrics to make informed access management decisions
5

Access Management Resume Examples & Samples

  • Proficient in configuring single sign on authentication schemes across a large infrastructure with several hundred thousand users
  • Must be able to work with other infrastructure teams to assist and manage the installation of other systems that may be a dependency to the proposed solution
  • Can troubleshoot complex applications authentication issues for SSO Infrastructure, LDAP, and other core system issues
  • Share knowledge and document 1st, 2nd, and 3rd level support information to assist Service Center team and reduce escalations to product team
  • Help document current environment and provide detail architecture suggestions to suggest "ideal state". Be able to perform a gap analysis on current state and assist with building road maps to address gaps
  • Provide process improvement and automation suggestions to the team
  • Direct experience with mature Identity management systems is highly preferred
  • 5+ years' experience with access management and federation solutions such as SiteMinder, NetIQ Access Manager, and/or Ping Federate
  • Experience with SAML debugging
  • Networking and load balancing concepts and debugging
  • Experience with management and monitoring of SSO products
  • Authentication Solutions, and LDAP Directories in a highly load balanced implementations
  • Object level design practices in Java, C/C++, Perl, and/or other development environments a plus
  • Knowledge of: shell scripting (ksh and/or bash)
6

Senior Director, Offnet Access Management Resume Examples & Samples

  • Assist with driving off-net access strategy, drilling down into aspects of supplier preference, access solutions, designs, diversity, performance, solution portability, new technologies, ease of service delivery and assurance
  • Assist in the selection qualification of off-net access suppliers, negotiating agreements and managing the high level strategic relations
  • Audit existing off-net solution providers to maximize efficiencies and cost savings opportunities
  • Ensure off-net access solution(s) interface smoothly into our product suite, synchronizing on all technical specifications
  • Manage Off-Net presale quoting team to support the company by sourcing network capacity via off-net vendors
  • Responsible for assisting with launch and scaling new Comcast products and coordinating channel development initiatives, which may require translating clear strategic priorities into execution plans in line with our business goals and objectives
  • Directs the development and ongoing maintenance of standardized operational guidelines and process controls, and supports adherence to those guidelines through conflict resolution and escalation management across corporate and field organizations
  • Seeks out new approaches to improving sales effectiveness and efficiency, including the use of technology, tools, process and talent management
  • Leads the identification and development of tools to effectively communicate strategic priorities, corporate initiatives and national guidelines to the field sales organization
  • Communicates persuasively and effectively with the executive team and internal partners (e.g. Marketing, Finance, IT, Legal etc.)
  • Directs project management and consulting including coordinating activities across regional field organizations and facilitating alignment to a common approach as necessary
  • Assists with the development of channel communications for all audiences (corporate and field)
7

Senior Access Management Resume Examples & Samples

  • 3+ years of experience with design level engineering and support in Access Management (SSO/FSSO) in a large corporate infrastructure specifically leveraging IBM (ISAM (formerly known as Tivoli Access Manager or TAM) and TFIM
  • Experience with the following development environments/languages: Java, JavaScript, Shell Scripting and PERL
  • Operational knowledge of WebSphere
  • Experience with Java Webservice
  • Working knowledge of Microsoft Windows/Unix/Linux/VMware
  • Understanding of TCP/IP networks, HTTP, and DNS technologies (including F5 VIPs and Firewalls)
  • Experience with one or more Database platforms (Oracle, MSSQL, MySQL, DB2)
  • Hands on experience in supporting an access management system integrated with target applications such as Active Directory, Oracle Directory Services, SAP, RACF and AS400 (including LDAP protocol and user registries)
  • ITIL knowledge (Incident Management, Problem Management, Change Management and Release Management)
  • Experience with developing applications using TIBCO BW a plus
  • Knowledge of Access Management including
8

Director Access Management & Applied Cryptography Resume Examples & Samples

  • Provide management leadership to the team members under IAM and Applied Cryptography
  • Actively participate in the development of IAM Strategy and strategic planning of IAM Program(s)
  • Translate IAM Strategy and agreed strategic IAM Program goals into tactical and actionable roadmap for Windows Systems. Drive the team to execute on the roadmap timely and strike a balance between security and operational excellence
  • Act as site manager for team members within the same location and collaborate with other managers to build cross team teamwork
  • Deliver excellent IAM and encryption services as per agreed SLA with customers; ensure compliance to Visa's IT Service Management Process
  • Partner with key business stakeholders within Visa (HR/CSAV/IAM Development/Engineering/Operations/CMDB) to develop innovative solution to improve the quality of IAM service delivery within Visa
  • Develop detailed IAM program metrics for reporting to senior management and key business stakeholders
  • Establish continuous monitoring of performance metrics and leverage metrics to drive process improvements
  • Provide guidance and direction on access controls and IAM practices to customers
  • Liaise with internal and external auditors on IAM and encryption related audits and reviews
  • Drive team members toward achieving the team goals – "beyond the normal BAU" – this includes process improvement and risk reduction initiatives
  • Develop, publish and maintain the team service catalog
  • Work with team members to develop individual career development plan
  • Proactively identify audit and compliance access related issues to reduce the risk of security exposures on the support systems and applications; coordinate access management and encryption related audit and compliance tasks, such as user access reporting, key management and other relevant research and investigations
  • Proactively identify any needs to update existing access management documentation and ensure necessary updates are made in a timely manner
  • Mentor and provide guidance to team members
  • Instill global mindset and effective collaboration to team members
  • Flexibility to work after hours and weekends to accommodate and support the existing servers/applications maintenance windows
  • Manage the team's financials, specifically – resource forecast in VFM, travel/training
  • In-depth understanding of IT Service Management Process and Configuration Management Database
  • Understanding of current industry and regulatory standards for encryption technologies
  • Experience and understanding of key management methodologies, principles and current encryption technologies
  • Sound understanding of encryption algorithms, hardware(s) implementation and functionalities
  • Sound understanding of information security principles and IT infrastructure including operating systems, applications, and communications and network protocols
  • Sound working knowledge of the security sub-subsystems and 3rd party security products in use on Visa Active Directory and Windows systems, specifically QUEST Active Roles Server, QUEST Change Auditor, QUEST Access Reporter, Random Password Manager, Oracle Identity Manager (OIM)
  • Broad and deep background in all aspects of Identity and Access Management from HR driven processes (on/off-boarding, conversions, transfer), to IAM compliance issues, privileged access management, role based access controls (RBAC), role engineering, including hybrid approach to role modeling and role mining
  • Experience with Active Directory implementation in multi forest environment
  • Payments Industry knowledge or experience
  • Strong analytical skills on the team's services, processes, workload and metrics
  • Have a global mindset and collaborate effectively within and across teams in different part of the globe
  • Strong leadership and mentoring skills necessary to provide support and constructive performance feedback
  • The ability to work effectively with other functional areas and understand the operational and cultural issues relevant to achieving superior results
  • Must be flexible and able to handle multiple competing priorities in a fast-paced environment
  • Be a self-motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
  • Strong ability to work independently and in collaboration with others to achieve a high level of success
  • Strong interpersonal and collaboration skills with the ability to develop, maintain and foster constructive relationships with others
  • Dynamic, hard-working and ambitious individual, with excellent oral and written communication skills ​
  • Bachelor degree in computer science, computer engineering, information security or equivalent job experience
  • CISSP, CISA, CISM and other comparative information security certifications are preferred
  • 7 to 10 years information security experience required
9

Access Management Resume Examples & Samples

  • Respond to telephone calls, e-mail, and web requests for technical support from internal staff members
  • Initiate follow-up e-mail, telephone, or face-to-face contact with the requestor if additional information is necessary to properly understand and diagnose the issue
  • Take necessary steps to resolve an issue or escalate appropriately
  • Keep the requestor informed of the status of the request, especially if additional research or escalation is required
  • Partner with other internal teams for technical expertise and problem resolution, as needed
  • Provide timely, detailed, and accurate status information and resolution for all issues/projects assigned
  • Meet minimum productivity and quality standards for issue handling
  • Onsite attendance is an essential function of the job and is required
  • Ability to handle multiple requests concurrently
  • Demonstrated customer service and interpersonal skills
  • The highest level of integrity, courtesy, and respect for all employees and others in the workplace
  • Creative technical problem-solving and analytical skills
  • Excellent English oral and written communication skills
  • Ability to interface and build trust with internal clients
  • Capable of and willing to explain technical issues and resolutions in non-technical terms
  • Ability to understand new technologies quickly
  • Bachelor degree in related field and at least 3 years of related experience
  • 1-3 years in Customer Facing Role
10

Senior Access Management SME Resume Examples & Samples

  • 5 years experience in Identity and Access Management (IDAM, IDM) designing or implementing
  • Experience with implementation of end-to-end marketing leading product such as IBM’s IGI (previously known as CrossIdeas), SailPoint IdentityIQ (IIQ), Aveksa on a large enterprise
  • Experience as a Consultant supporting IDAM project
  • Thorough understanding of Roles design, Segregation of Duties and Usage Analytics and User Behaviour Analytics
  • Knowledge of Mainframe Applications and Integration patterns
  • Knowledge of performance tuning (including database tuning)
  • Familiarity with other features/capabilities of Access Governance Datawarehouse
  • Knowledge of IBM Enterprise architecture patterns
  • Thorough knowledge of audit and compliance especially in the context of IBM
11

Privilege Access Management Resume Examples & Samples

  • The Vault Administrators are responsible for maintaining the application layer of the CyberArk PIM Suite
  • Activities will typically include
  • Bachelors degree in Business Administration, MIS, or related field or 11 – 14 years equivalent work experience
  • Working knowledge of Microsoft application software (i.e., Word, Excel, Visio and Project)
12

Privileged Access Management Resume Examples & Samples

  • Extensive experience of working in Identity Access Management as a Technical Analyst/SME
  • Extensive experience of working in Privileged Access Management as a Technical Analyst/SME
  • Must have strong Financial Services domain experience
  • Analytical and conceptual mind-set to challenge and automate manual steps in Privileged Access Management processes; have a good grasp of Privileged Access Management technology and technological concepts (e.g. databases, UML)
  • A detailed approach to the review and quality assurance of the content of systems specifications. - Experienced in the lifecycle of data and how data interacts and impacts processes - Data analysis experience, including data migration
  • Detailed experience in process design and implementation with the ability to translate non-functional requirements into comprehensive and concise functional specifications
  • Awareness of information security and experience Identity Access Management
  • Client-orientation
  • Understanding of information security standards
  • Excellent written communication and presentation skills
  • Strong analytic skills, a fast learner who is adaptable to change with a high attention to detail
  • Understanding of and background of network, application and security technologies and concepts
  • An independent self-starter, with a strong sense of personal initiative and the ability to drive through deliverables as planned
13

Manager, Access Management Resume Examples & Samples

  • Act as performance manager for a team of technical resources, coaching and mentoring team members
  • Coordinate incident and request fulfillment for a technical team focused on IAM operations
  • Able to work independently and represent Technology Operations on project portfolio initiatives that leverage the IAM platform solution
  • Establish a continual service improvement plan and drive internal projects to improve overall IAM platform service; continual service improvements will focus on operational excellence, process and resource efficiency and financial management
  • Implement and manage effectiveness of Incident, Service Request, Change and Problem management processes for the service area
  • Work very closely with development groups, business liaison teams, operations staff, security group, data center staff and server administration groups on all activities related to application integration and system enhancements
  • Minimum five years of professional work experience with 4 years of experience implementing packaged or custom IAM solutions, 3 years of consulting experience, 2 years of experience leading a technical team and 2 years of project management experience
  • Bachelor's degree from an accredited college or university or equivalent work experience
  • Direct experience with the following technologies: Directory Services, Authentication/Authorization, Access Provisioning, Access Review, Single Sign On, Federation and DataPower
  • Hands-on experience developing and deploying large-scale enterprise Identity & Access Management solutions; knowledge of enterprise security tools, including identity management, access control, security operations, and management tools
  • Experience integrating applications into shared services framework with focus on security access control products, system authentication methodologies, Single Sign On, Role Base Access Control, IBM Tivoli Access Manager, IBM Tivoli Identity Manager, IBM Tivoli Federated Identity Manager, Self Service/Self Registration technologies; experience managing enterprise directory implementation and directory services administration, LDAP (Active Directory, IBM Tivoli Directory Server, Novell eDirectory, etc); familiarity with federated identity and web services security concepts such as SAML, Liberty ID-FF and ID-WSF, WS-Federation and WS-Security
  • Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority; must be able to prioritize, delegate and foster the development of high performance teams to lead/support an environment driven by customer service and team work; strong trouble-shooting and organizational skills and ability to work on multiple projects simultaneously; ability to participate in resource planning processes based on defined organizational plans
14

VP, Access Management Resume Examples & Samples

  • Develops off-net access strategy, including but not limited to supplier preference, access solutions, designs, diversity, performance, solution portability, new technologies, ease of sales quoting, service delivery and assurance
  • Leads the selection of and qualification of off-net access suppliers, negotiating agreements and managing the high level strategic relationships as well as periodic performance reviews
  • Oversees audits of existing off-net solution providers to maximize efficiencies and cost savings opportunities and to ensure our sales team is able to offer competitive solutions to customers
  • Ensures that off-net access solutions are always compatible with our product suite and longer-term product roadmap
  • Ensures that we have sufficient and just-in-time capacity in all aspects of off-net access
  • Mentors and leads department, overseeing all functions to ensure performance standards are conducive to Company standards and all goals and objectives are met in a timely and organized function
  • Directs staff to automate, when appropriate and cost-effective, our off-net quoting process and manage the off-net presales quoting team to meet our business objectives
  • Collaborates with appropriate teams on with launching and scaling new Comcast products which have an off-set access component and coordinating channel development initiatives, which may require translating clear strategic priorities into execution plans in line with our business goals and objectives
  • Directs the development and ongoing maintenance of standardized operational guidelines and process controls, and supports adherence to those guidelines through conflict resolution and escalation management across corporate and field organizations. Collaborates and coordinates activities with other Comcast operations teams, as appropriate
  • Determines new approaches to improving off-net sales effectiveness and efficiency, including the use of technology, tools, process and talent management
  • Formulates execution approaches and oversees the implementation of initiatives with minimal disruption to BAU field operations
  • Directs project management and consulting including overseeing activities across regional field organizations and facilitating alignment to a common approach as necessary
  • Consults with other departments on the development of channel communications for all audiences (corporate and field)
  • Directs the continuing review of all current systems and formulation of future systems so as to efficiently accomplish business purposes within budget
  • Regular, consistent and punctual attendance. Must be able to work variable schedule(s) as necessary
  • Communicates persuasively and effectively with the executive team and internal partners (e.g. Field, Marketing, Finance, IT, Legal etc.)
  • Education Level: -Bachelor's Degree, MBA preferred
  • Field of Study: Business, Operations Research/Management, Engineering fields, similar fields of study
  • Years of Experience:-Generally requires 12+ years related experience
15

Access Management Lead Resume Examples & Samples

  • Work with overall Access Management Lead, Information Security, and cross-functional partners to build, maintain, and execute on a roadmap considering short, medium, and long term access control and operational needs for tools
  • Evaluate and design operational management processes and procedures to effectively and efficiently own and provision access to all internal tools
  • Drive progress of Facebook's internal permissions system, including managing and prioritizing roadmap of feature requests
  • Work directly with teams across Facebook and affiliate companies to understand workflows and tool usage, and then roll out scaled access assessment initiative to help drive progress against tailored and contextual access goals
  • Help iterate on Access Management operations team resources via dashboards, documentation, and employee guidance/best practices
  • Work directly with operations team on escalations of tool-related permissions issues
  • 7+ years identity and access management, business analysis, or related professional services consulting
  • Ability to manage competing priorities and simultaneous projects in an environment with supervision
  • Analytical and problem-solving skills
  • Understanding of data models with SQL experience to write queries and perform data analysis
16

Manager, Access Management Resume Examples & Samples

  • Perform daily health checks of Identity and Access Management (IAM) platform to help ensure service is operating at optimum levels; generate daily, weekly and monthly reports to measure the IAM service against key performance indicators
  • Develop and maintain system configurations and process design documentation, operating procedures and application integration documentation; recommend and participate in development, testing, implementation and support of all enhancements to the systems, services and technologies used by the IAM platform
  • Participate in application architecture and design review working directly with internal application houses and business owners on the integration of their applications into the IAM platform
  • Maintain and assess operational requirements and service issues for improvement opportunities; help to ensure production implementation and maintenance activities are performed as required
  • Provide third level support on application integration issues to application houses
  • Minimum seven years of IT experience, including experience in software development and/or software administration, as well as direct experience with IBM Tivoli Federated Identity Manager and IBM Security Access Manager (ISAM)
  • Direct experience configuring and support of at least 20+ SAML 2.x federations; demonstrated knowledge of one or more of the following operating systems: Windows, i5/OS, z/OS, AIX, and/or Linux
  • Experience in at least three of the following: IBM Tivoli Federated Identity Manager (TFIM); IBM Security Access Manager for Web (ISAMfw) formerly IBM Tivoli Access Manager Enterprise Business (TAMeB); IBM Security Access Manager for Mobile (ISAMfm) - IBM Tivoli Directory Server (TDS); IBM Tivoli Directory Integrator (TDI); IBM Security Integrator Manager (ISIM) formerly IBM Tivoli Identity Manager (ITIM); Nagios; Splunk
  • Experience around the majority of the following technologies: : SAML, OAUTH, OpenID, Web Services, WS-Security, HTML, XML, JavaScript, XSLT, SOAP, Ikeyman, LDAP, Java/J2EE, JSP; experience with DB2, SQL Server, Oracle, and/or other enterprise-class RDBMS
  • Experience as a member of a technical project team- from design through delivery, demonstrated experience making technical decisions regarding assigned tasks when presented with options by other team members, experience troubleshooting and identifying potential problems and making appropriate changes as necessary, experience creating technical documentation and excellent presentation and communication skills
17

Access Management Change Anayst Resume Examples & Samples

  • Previous experience of working in a specific Access Management change based role – suitable to a FTSE100 business
  • Ability to demonstrate experience of working in an outsourced supplier model
  • Experience of working in an ITIL model …
18

Global Access Management Resume Examples & Samples

  • Understand, define, and implement Self-Service portals that will empower the business to action tasks, reducing Global Access Management manual efforts
  • Implement automation solutions to improve operational processes, including scripting and enhancements to existing workflows
  • Provide technical support for STEALTHBITS technologies and any other technology tools to enhance Access Management service delivery, self-service initiatives, and reporting
  • Vendor relationship and support to understand product upgrades, patches and enhancements – as well impact of each to existing environments
  • Interact with senior colleagues in other areas of technology to identify and correct problems
  • Deal competently with multiple large projects or problems simultaneously
  • Ensure all access governance technology services are delivered to defined SLAs
  • Provide Ad-Hoc reporting for Service Delivery as required
  • Ensure that monitoring requirements are implemented and observed
  • Provide appropriate support documentation and tools for colleagues at all levels
  • Adhere to standards as defined, identifying and recommending improvements as necessary
  • Implement policies, standards, and processes for all aspects of Global Access Management Operations
  • Ensure that all security policies are followed and enforced
  • Note - qualified candidate(s) must be located in the Louisville, KY OR Hoboken, NJ area(s) OR willing to relocate - no other exceptions will be made at this time
  • 7+ years experience in IT
  • 5+ years experience in the field of relevant technologies
  • Track record of delivering to deadline and budget
  • B.S. computer science preferred
  • Proficient knowledge of NTFS File/Share Permissions
  • Extensive understanding of Active Directory
  • Data and systems governance experience
  • Understanding of Automation technologies
  • Basic PowerShell/AD Scripting
  • Proficient using MS Windows Applications (Excel, Word, Project, PowerPoint)
  • Strong organizational skills with emphasis on detail and follow-up
  • Ability to communicate effectively with all levels of IT staff as well as other departments on issues of varying complexity; good judgment and flexibility in response
  • Delivery focused – strives to meet commitments and quality targets
19

Logical Access Management Lead Resume Examples & Samples

  • To engage collaboratively across all stakeholders to ensure appropriate prioritisation of delivery
  • Risk remediation Governance
  • Centralised MI function
  • Operation of IaaS Access recertification controls ensuring that recertification campaigns run at required frequency and complete successfully
  • Responsible for the on-going operation of automated access provisioning and Life Cycle Management processes that are being delivered by the Infrastructure Access Management Program
  • Take personal responsibility for the delivery of timely and appropriate governance & risk decisions relating to Logical Access Management
  • Manage performance of Logical Access Management controls, attending all appropriate governance meetings and providing regular performance reports to IaaS Risk & Security Officer
  • Provide timely, accurate and clear advice based on evidence and accurate data
  • Identify, produce and publicise enhancements to Logical Access Management processes in line with Barclays Internal Audit and Technology Quality Risk Services standards
  • Responsible for ensuring that regular quality checks are performed to confirm that key Logical Access Management controls are operating effectively
  • 40% Operation
  • Working knowledge of Logical Access security standards and best practice for permissioning access to infrastructure
  • Understanding of the GIS OneCert and Account Enrichment Tool solutions
  • Broad understanding of Infrastructure Services strategy and business direction
20

Manager, Access Management Resume Examples & Samples

  • Oversee the enterprise-wide process for granting new access, updating existing, and timely removal of access that is no longer required
  • Lead teams supporting enterprise system access request fulfillment
  • Monitor key performance indicators to improve the flow of access requests
  • Influence customer and/or organizational leadership through effective listening and communication to accomplish objectives
  • �Champion access management processes and procedures throughout the business
  • Generate and lead formal and/or informal presentations to customers and project team members
  • Apply expertise to achieve financial and operational objectives
  • Able to create challenging roles to build organizational capability and fill gaps
  • Articulate and persuasive leader who can serve as an effective member of the management team and who is able to communicate security-related concepts to a broad range of technical and non-technical staff
  • Adaptable; self-starter; team player and team leader; quality minded; focused; committed
  • Understanding of various authentication technologies
  • Information security certification such as CISSP or CISM or technical certification in IT auditing (CISA) a plus
  • High level understanding of server/database/application administration, change management, system development life cycle
  • Bachelor's degree (B. A.) from four-year college or university; or equivalent training, education and experience
  • Degree in Information Security, Computer Science or IT-related field preferred
  • Manager: Delegates authority to carry out work of a unit to subordinate supervisors or managers
21

IT Service Specialist, Access Management Resume Examples & Samples

  • Be IT literate with a sound knowledge of Microsoft Packages including Excel, PowerPoint, Word, Case Management Tools, etc.,
  • Be competent in communicating in English both verbally and in writing,
  • Have a good attitude for learning new technologies,
  • Strong analytical/problem solving skills,
  • Ability to follow complex verbal and written instructions,
  • Working knowledge of and experience in utilizing and creating spreadsheets,
  • Able to prioritize workload in a demanding environment
  • Experience of Workday,
  • Experience of working in a service environment,
  • Knowledge of data security and access management,
  • Experience in Access Management,
  • Experience in Databases (e.g. SQL Server or Oracle)
  • Workday access management to production and non-production tenants,
  • Escalations of access requests that fall outside of the agreed framework,
  • 90 day audit of all workday access,
  • Support requests from external and internal audit process,
  • Project support as needed,
  • Reporting to Access & Compliance Manager
  • As soon as you send us your application our HR tem will screen your CV, it will take approximately 1 week after closing date of the job advertisement
22

Specialist Logical Access Management Resume Examples & Samples

  • Coordinates and provides liaison to high level customers for identity management initiatives and programs such as role management
  • Provides primary liaison for Application owners in defining mapping of roles and entitlements for provisioning within their application
  • Provides primary liaison for application customers in mapping users to roles and application access
  • Conducts audits or reviews of identity management compliance under direction of management
  • Excellent understanding of security processes and technologies
  • Understanding of the security mechanisms associated with Windows or Unix operating systems, networks, applications and databases
  • Deep understanding of IAM concepts and industrial trends
  • Ensure SOX controls operated via I&AM toolsets are executed
  • Adapt global initiatives and products to allow for implementation within the constraints of the Africa environment while adhering to the intent of the global strategy
  • Preferred B-degree in Technology related subject (NQF level no. 6)
  • 3 years technical IT experience
  • 1 year business analysis/technical architect
  • Demonstrate a passion for IAM, data patterns and working with solutions in this area
  • Proven experience with identity and access management
  • Solid understanding Identity and Access Management key principles
  • Technical certification essential and proven large project experience
  • Comfortable to interact with technical resources
  • Comfortable to interact with middle management
  • Presentation skills / comfortable to present to business stakeholders
23

Global Access Management Resume Examples & Samples

  • Team/People Management
  • Qualified candidates must be located in the Louisville Area
  • B.S. computer science
  • 3+ years experience in IT
  • 3+ years experience in the field of relevant technologies
  • 10 + years non-degree experience
  • Essential Skills
24

Access Management & Provisioning Resume Examples & Samples

  • Associate’s or Bachelor’s degree from an accredited college or university with specialization in an information technology field or equivalent combination of experience, education, and/or certification preferred
  • A minimum of one year of access control experience with a general understanding of distributed networking systems, database management systems, and applications required
  • Intermediate understanding of programs including, but not limited to Microsoft Office, Internet, and Outlook e-mail
  • Intermediate understanding of new and emerging technologies
  • Intermediate understanding of industry and FRS compliance regulations
  • Maintains confidential information and demonstrates tact, discretion and diplomacy
  • Ability to communicate technical issues
  • Availability to work assigned shift (hours of operations are 7:00 a.m. to 6:00 p.m. CT, Monday through Friday)
  • Strong interpersonal, analytical and customer service skills
  • Works well in a team environment
  • Ability to work independently with direct supervision as needed
  • Multitasks and uses time efficiently
  • Organizational skills and ability to prioritize work/deadlines required
25

Director, Access Management Resume Examples & Samples

  • Develop procedures intended to sustain the security of the organization's data and access to its technology and communications systems. Ensure the distribution and communication of these procedures in appropriate systems and media
  • Plan the performance of tests (and simulated attacks) on the security procedures of the organization's systems and communications technology to assess their vulnerability and ways in which existing security measures are adequate or insufficient
  • Track daily reporting of breaches or attempted breaches of the organization's data and systems security measures in order to plan appropriate upgrades of security or new measures or operating procedures needed to advance security interests
  • Track security measures of clients or partners of the organization that may compromise sensitive data or information. Communicate the organization's security standards or specific concerns to clients or partners regarding their operating procedures
  • Report to senior management on the unit's production, activities, and efforts
  • Represent the unit as an expert or resource to cross-functional project or coordinating teams
  • Plan, document, and manage the performance of subordinate managers and/or staff. Provide for professional or technical growth through assignment, mentoring, or training
  • Plan and manage the unit's budget. Approve expenditures or budget transfers
  • Experience interfacing with internal audit and regulatory bodies
  • Ability to generate innovative ideas and challenge the status quo
  • Strong problem resolution, judgement, communication and decision making skills
  • Ability to adapt to a changing, fast-paced, team environment and multi-task assignments
  • Ability to approach problems with a sense of ownership, enthusiasm and out of the box thinking
  • Ability to work well under pressure when the situation is ambiguous
  • Proficient understanding of Microsoft products, software lifecycle methodology and moderate to deep knowledge of Identity Products
  • Working knowledge/familiarity with the following access management tools and security controls
  • Federated Identity Management (FIM)
  • Open authentication protocols (SAML, OAuth, OpenID)
  • Single Sign On (Ping)
  • Entitlement management – ie. IAG/SailPoint
  • Privileged Access Management (CyberArk)
26

Access Management Resume Examples & Samples

  • Bachelor's Degree with 1+ years of application development experience
  • Working knowledge of Oracle database, SQL queries/scripts and XML
  • Experience with any one of the Java application servers (Websphere/Weblogic/JBoss/Tomcat)
  • Understanding of Identity and Access Management principles
  • Experience with Active Directory/LDAP directories and software development tools
  • Familiarity with various IT systems (Unix and Windows servers, Databases, Active Directory etc..)
27

Head of Privileged User Access Management Resume Examples & Samples

  • Own the integrated, Group-wide privileged access management and governance framework
  • Own and manage the lifecycle of privileged users access credentials
  • Monitor, detect and respond to any anomalies related to privileged access
  • Own and manage the enterprise privileged access management platforms
  • Oversee the privileged access management architecture and design process
  • Mitigate security issues related to privileged access management
  • Manage, co-ordinate and deliver projects as required to ensure the efficient and effective utilisation and implementation of privileged access management
  • Maintain responsibility for the policies related to privileged access management
  • Support internal and external audits from a privileged access management perspective
  • Experience in Information Security field > 10 years
  • Experience in privileged access management > 5 years
  • Proven experience in managing enterprise-level privileged access management
  • Proven experience in working with federated privileged access management models, including Single Sign-On
  • Proven experience in architecting and designing privileged access management solutions
  • Cross cultural sensitivity, flexibility
  • Organized with a proven ability to prioritize workload, meet deadlines, and utilize time effectively
  • Strong interpersonal and communication skills; able to deal effectively with diverse skill sets and personalities, works effectively as a team player
  • Ability to function effectively in a matrix structure
  • Operate comfortably at management level
  • Strong facilitation, negotiation and conflict resolution skills
  • Apply analytical rigor to understand complex business scenarios
28

Identify, Credential & Access Management Lead Resume Examples & Samples

  • With a wide range of knowledge, performs independent assessment of the information security posture of an organization using applicable tools and designing PKI implementations
  • Assesses information and ensures PKI technology is working
  • Purchase smartcard tokens & track HSDN smartcard inventory
  • Manage user identity tokens
  • Manage all tokens in the token tracking system
  • Run reports for the PMO on the use of tokens
  • Configure RA workstations specifically for PKI
  • Procure, configure and manage CAC card
  • Current TS/SCI Clearance
  • Typically requires a bachelor's degree or equivalent and seven to nine years of related experience
  • Responsible, reliable and flexible
  • Passion for learning and knowledge transfer
29

Access Management Specialist Active Directory Resume Examples & Samples

  • Work as part of a team to deliver complex Projects including: identification, assess and advise on risks to the success of the project
  • Consults on viable and valid system solutions which involve changes to working conditions and practices, showing understanding, imagination and creativity in designing such solutions
  • Deliver Project service and support take-on documentation using appropriate mix of text versus graphics
  • Investigates and diagnoses complex end-to-end access problems
  • Assist with the Selection of appropriate standard procedures and tools, and carries out defined tasks associated with the planning, installation, upgrade, operation, control and maintenance of the relevant specialisation
  • Ensuring all appropriate documentation is updated throughout the solutions lifecycle
  • Act as technical specialist to other team members
  • Liaise with other teams within IS to resolve wider operational technical issues