Job Description :
Title: Identity and Access Management (IAM) Operations Manager, Job #134 Location: Hingham MA 02043 Start: 04/05/21 Duration: 07/02/21 - TEMP TO HIRE Possibility Interview Process: First round interviews will be 30m phone, and then finalists will meet via video with two managers and a peer. They plan to ask behavioral questions around the transformation experience component, so please be sure candidates can speak to that experience. We will need # of years of experience and rank themselves as: beginner/intermediate/advanced in following: (If someone has no significant experience with something, please mark them as Beginner. If they have ANY noteworthy experience with something, please mark them as Intermediate, not Beginner, to help differentiate. Leadership/ Management Role IAM Governance Transformation/ Automation Experience MUST BE ABLE TO CONVERT WITHOUT SPONSORSHIP SIT ONSITE IN HINGHAM MA AFTER COVID New temp to perm Identity and Access Management (IAM) Operations Manager req opening with the Security Team. The IAM Manager will directly supervise about six IS Administrators, and directly report to the Director of Identity Governance and Administration. The position can be done remotely until the office reopens, at which time they will need to work in the Hingham office. The IAM Manager will be managing the IM operations team (this is the team who handles access tickets They need to be an IM professional with an understanding of how digital identities work, and have hands on experience with IA governance and some sort of industry-standard IGA tools. They also need to have actual supervisor/ team manager experience with direct reports, doing performance management, reviews, producing dashboards, using Visio & Excel, reporting metrics, etc. Finally, in addition to day to day operations, this person would be involved in process reengineering. This team has legacy manual processes that haven't been updated in some time. The department is looking to re-envision and automate these processes. Therefore, they are looking for someone who has this kind of vision, and ideally someone who has done it for their organization in the past. The ideal candidate would be someone with prior experience managing an IAM team, who also has transformation experience overhauling manual processes and added value to their organization. Relevant certifications (CISSP, CISM, GIAC, CISA) are a plus but not required. Identity and Access Management Operations Manager, Job#134 The below is provided by the hiring manager: Position Summary: The Information Security IAM Operational Manager possesses in-depth knowledge and experience leading a team of Information Security Administrators and Analysts in support of an Enterprise Identity and Access Management program. This person is an effective leader who gathers and translates business requirements into optimized processes, controls, metrics, and reporting in order to drive continuous improvement and process excellence. This manager is responsible for ensuring that the team operates effectively, focusing on the "right work" in the "right way" while delivering measurable and impactful results to the business. The manager should also have experience with driving process transformation, in order to align people, process, and technology in support of re-envisioned Identity Governance and Administration (IGA) organization. This may include leading customer / business facing engagements to ensure that needs are understood and translated into appropriate actions for the new IGA program. This leader should have experience with Identity & Access Management automation, enterprise solutions and business process engineering as it relates to workforce identity management. This leader will be an advocate for our processes both internally and with external business units, taking every opportunity to teach and set expectations. He / She will evaluate and consider risks of changes to the IAM environment and effectively communicates across a wide variety of constituents. Key Accountabilities: Operational Management Remains current with current IAM operations, technology, and business requirements to better align delivery and/or to fill gaps or enhance service. Participates in the issue resolution process for applicable identity and access management-related production problems, escalate issues as appropriate. Act as first line of defense regarding reasonableness of incoming request. Support IAM development initiatives by leading the creation of basic use cases and specification gathering. Determine and set operational and development priorities for this team. Possess a basic understanding of scripting approaches and techniques as it relates to programmatically interacting with digital ID repositories. Be an evangelist for security / controls by design and have the data analytic skills and drive to capture, analyze, share and make decisions based on the story it tells. Strategy and Planning Leads project initiative acceptance and prioritization of efforts. Conducts research to determine if existing application assets, services definitions, and/or requirements can be reused; Uses standards as much as possible. Provides leadership in the implementation, and support of technology applications. Designs creative approaches to business needs and lead the team to successful implementation. Key Competencies: Adaptability and Growth Challenges the status quo and acts as a change agent. Demonstrates ability to adjust priorities and adapt approach to changes in environment Demonstrates ability to follow through on multiple tasks or issues Metrics-Based Management Style Analyzing Needs and Proposing Solutions Takes immediate action when confronted with a problem or when made aware of a situation When proposing solutions works with supervision to evaluate options by considering the implications, risks, feasibility, and consequences. Fostering Teamwork and Collaboration Demonstrate ability to appropriately involve others in decisions and plans that affect them Enhances others' ideas, adds own ideas to the question at hand, and gains clarity about own thinking Mirror desired behavior Building Trust Share own thoughts, perspective, and rationale so that others understand positions and policies Effective advocate for IAM processes and for producing services that best serve our environment and customers. Communicating Effectively Begins to facilitate dialogue Able to elicit information from others through effective communication; summarize others' point of view Developing skills to adapt communication style, delivery method and message context to meet the needs of the audience Tell the story based on data captured Influencing and Negotiating Able to understand and communicate multiple perspectives or others. Recognizes and understands objections and with guidance, develops approaches to respond appropriately Develop relationships Acting with Urgency Shows tendency to take actions that go beyond requirements to achieve objectives Efficiently plans and performs work in accordance with expectations Assumes responsibility and accountability for successfully completing assignments Begins to identify obstacles and with guidance overcomes barriers Leadership Leads, guides, mentors and motivates a team of Information Security professionals. Acts with confidence, technical competence and accountability Is metrics driven and delivery focused. Customer Focus Act as a liaison with other business areas to assist them in the data definitions required for successful project implementation Develop and maintain effective working relationships with key external and internal customers Experience and Education: