SUMMARY/OBJECTIVES
- The Manager of Identity & Access (IAM) Management is responsible for the planning, building, delivery and support of the IAM program and team. This manager will provide direction and guidance to the development, specifications, and communications of the IAM application(s) and architecture, as well as provide in-depth technical consultation to the business units and IT management and assist in developing plans and direction for the integration of information security requirements. The Manager will also be responsible for leading a high-performing team responsible for day-to-day IAM operations and for providing IT and Enterprise IAM subject matter expertise. Additional responsibilities include ownership and oversight of audit, regulatory and SOX requirements and management responses related to each. This position will be hybrid and can be based in the following locations: Winter Haven Florida, Orlando Florida, Tampa Florida, Charleston South Carolina, or Columbia South Carolina.
ESSENTIAL FUNCTIONS
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
DELIVERY
- Facilitates the use of technology-based tools or methodologies to review, design and/or implement products and services to provide a strong IAM program that balances access with compliance and confidentiality.
- Identifies and evaluates complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement.
- Identifies the broader impact of current decisions related to user access, data access and information security.
- Responsible for managing IAM Audit and Regulatory Exam activities and deliverables including remediation and/or process improvement efforts.
- Responsible for successful implementation of user provisioning and access review tools to help automate and streamline existing IAM processes.
- Align IAM processes across the organization.
- Develop and document procedures and standards that align with Information Security policies.
· Understand business and information technology management processes and demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards.
· Establish and/or strengthen disciplines, standard operating routines, and employee performance objectives to achieve desired business results.
PROFESSIONAL
- Serve as a resource for change enablement by embracing change and championing innovative ideas/opportunities.
- Develop business partnerships to build & increase buy-in across multiple lines of business and functions. Establish effective relationships with Technology and Information Security personnel, program and project managers, and other business partners.
- Prioritize and manage own and team’s workload to deliver quality results and meet timelines. Ensure quality and accuracy of data and information is a priority.
- Support a positive work environment that promotes service to the business, quality, innovation, and teamwork and ensure timely communication of issues/ points of interest.
- Identify and recommend opportunities to enhance productivity, effectiveness, and operational efficiency of the business unit and/or team.
- Facilitate cross departmental meetings effectively with prepared agendas and clear next steps to move toward implementation, completion, or resolution of projects or issues.
- Continuously enhance knowledge/expertise in own area and keep current with trends/development and regulatory changes which may affect documentation or processes. Develop awareness of South State Bank Technology services, applications, infrastructure, analytical tools, and techniques which can contribute to better analysis.
- Possess and demonstrate effective communication skills/habits, both written and verbal
- Accepts other duties as assigned.
COMPETENCIES
· Advanced knowledge of IAM best practices, tools, and processes.
- Advanced knowledge MS Office tools, particularly Excel, PowerPoint, Visio, Word, and SharePoint
- Ability to manage/lead a high-performing team.
- Strong written and verbal communication skills
- Ability to learn and grasp new concepts and business processes quickly.
- Detail-oriented with ability to communicate with diverse stakeholders.
- Organizational skills; ability to multi-task and prioritize; strong attention to detail; ability to work in a dynamic environment, independently and within teams.
Qualifications, Education, and Certification Requirements
· Education: Bachelor’s Degree in Computer Science, Information Systems, Cybersecurity, or related field.
· Experience: 10+ years of experience in technology implementations with experience integrating Identity Management, Access Management and Access Governance software into existing infrastructure and applications.
Certifications/Specific Knowledge: Certified Information Systems Security Professional, and/or Certified Information Security Manager desired.
TRAINING REQUIREMENTS/CLASSES:
- New Employee Orientation
- Required annual compliance training.
- Cross departmental training
PHYSICAL DEMANDS
- Must be able to effectively access and interpret information on computer screens, documents, and reports. This position requires a large amount of time in front of a computer. This can be done sitting or standing with use of the right desk.
WORK ENVIRONMENT
- Telecommuting roles no matter if hybrid or 100% full time telecommuting must have a secure home office environment that is free from background noise and distractions. They must also have a reliable private internet connection that is not supplied by use of cellular data (hot spot). Cable or fiber connections are preferred. Requirements are subject to change, as new systems and technology is delivered. Travel may be required to come to meetings as needed.