Requisition ID # 154451
Job Category: Engineering / Science
Job Level: Manager/Principal
Business Unit: Information Technology
Work Type: Hybrid
Job Location: Rocklin
Department Overview
The Cybersecurity team enables PG&E to achieve its mission by providing governance, oversight, and support of operational resiliency and asset safeguards in a relevant, timely and data-driven manner. The Cybersecurity team consists of security professionals in their chosen disciplines working together, to review the current cyber threat landscape and lend our expertise to help the company understand its security posture and act on the highest priority risks. The Cybersecurity team takes a proactive approach to security by focusing on the cyber risks PG&E faces. Our methodology and framework synthesize current legal, regulatory, and operating mandates with PG&E’s business goals and operations. By taking this information and focusing on the cyber risks unique to individual Lines of Business (LOB), Cybersecurity helps PG&E’s LOBs make informed decisions about where to invest their resources.
Position Summary
The Identity Access Management (IAM) Principal Analyst is responsible for working with business units, technical staff, and compliance staff to establish and maintain the IAM compliance program ensuring appropriate controls are implemented to meet regulatory commitments. The IAM Principal Business Analyst requires a strong understanding of IAM principals, information technology products, and regulatory controls. The IAM Principal Analyst requires excellent analytical and communication skills, must be a proven self-starter with the ability to problem-solve, able to participate in diverse teams from a technical and business perspective, and interface effectively with our internal Cybersecurity teams, business customers, vendor partners, compliance staff and colleagues.
PG&E is providing the salary range that the company in good faith believes it might pay for this position at the time of the job posting. This compensation range is specific to the locality of the job. The actual salary paid to an individual will be based on multiple factors, including, but not limited to, specific skills, education, licenses or certifications, experience, market value, geographic location, and internal equity.
A reasonable salary range is:
Bay Area Minimum: $132,000
Bay Area Maximum: $226,000
Job Responsibilities
- Establish an IAM compliance program to effectively implement, manage, validate and update IAM regulatory controls addressing SOX, CIP, TSA, CEUD, CCPA, CPUC and other requirements.
- Establish processes to catalog, validate, remediate and mitigate IAM controls
- Establish an IAM compliance roadmap and key metrics to track deficiencies and identify people, process and technology improvements to benefit IAM compliance
- Establish an IAM educational program for business owners and subject mater experts to understand compliance requirements, compliance processes and key dates for deliverables
- Engage with business and application teams to understand their platforms and ensure appropriate IAM controls are established
- Coordinate with enterprise compliance teams to track key regulatory due dates, deliverables and provide data requests as necessary
- Produce process documents and escalation procedures for IAM compliance
Qualifications
Minimum:
- Bachelors Degree in Computer Science or job-related discipline or equivalent experience
- 10 years of experience in IT-Information Technology, Cybersecurity and/or IT Compliance
- Experience with identity governance platforms such as SailPoint IdentityIQ, BeyondTrust PasswordSafe or similar tools
- Experience managing security and/or compliance programs
- Experience with regulatory compliance management including SOX, CIP, TSA, CEUD, CCPA, CPUC and/or others
- Experience documenting compliance narratives, control validation processes, control test documents, compliance program roadmaps
- Experience in team-oriented, collaborative environment
Desired:
- Strong understanding of identity governance including “joiner, mover, leaver” principles
- Role-based access control (RBAC) experience is a plus
- Extensive experience in the analysis of access management and verification systems, authentication systems, credential management systems and access management tools
- Six Sigma process improvement, or similar experience is a plus