empty

IAM Technical Director II

Truist

Job Description

Posted on: 
November 18, 2024

Summary and company overview

Role Summary

A role that is responsible for leading portions of the identity management and access control functions as described by industry best practices such as NIST and FFIEC. This will include a subset of the following sub-functions: a) request b) provisioning c) deprovisioning d) normal access e) privileged access f) attestations g) identity governance administration h) identify management platforms i) production support j) authentication k) authorization and l) cloud.

Company Overview

NA

Responsibilities

  • Align with IAM-wide priorities that define ‘our what’ that may change based on business need
  • Consistently align with Truist Vision, Mission and Values and demonstrate ‘our how’ IAM works:
  • Accountability: set expectations, hold teams accountable, check-in and provide feedback
  • Remove ‘IAM Blinders’: take a Truist-wide approach to owning and resolving challenges
  • Strengthen Team: coach-up, performance manage, develop, and reward top performers/visibility
  • Management System: establish and cascade a predictable schedule for team engagement
  • Continuous Improvement: consistently seeking ways to get better
  • Manage a team of 5 to 10 direct report teammates and contract workers who oversee defined structured process tasks; may have oversight for complex, unstructured processes.
  • Perform hiring, coaching, terminations, disciplinary action, and performance reviews to enable and maintain the strategy.
  • Oversee strategic and operational plans in support of business objectives; develop cross-departmental business cases to solve problems by making technical and financial tradeoffs.
  • Apply a balance of 40% technical and 60% functional knowledge to deliver quality results.
  • Design and implement the identity management and access control strategy on time and within budget:
  • Formal Services Level Agreements (SLAs)
  • Workforce strategy blend of ~30% onshore and ~70% offshore that is comprised of ~30% teammate, ~60% vendor managed service, and ~10% time and material contract workers
  • Improve the user experience and reduce the turnover of critical resources
  • Proactively engage with stakeholders to make them aware and willing to adopt our solutions, which includes managing up, out, and down to avoid surprises and position our solutions to be successful.

Job Requirements

Required Qualifications:

  • Bachelor’s degree or equivalent
  • 15 years’ technical experience working in the identity and access management control function
  • 10 years’ experience as a manager
  • 10 years’ experience in operational planning and execution
  • 10 years managing simple and structured work
  • 10 years managing complex and unstructured work
  • 10 years’ experience leading diverse teams, such as teammates, contract workers, onshore, offshore resources, and/or managed services
  • 5 years’ experience and expert-level technical knowledge of product knowledge and processes for specific IAM areas (e.g., Active directory, RACF, Idaptive, CyberArk, PRIVA, Oracle OIM, Persistent Ignite)
  • 10 years’ experience and basic functional knowledge of tools and processes for the broader IAM capability
  • 10 years’ experience and intermediate-level strength in soft skills and interpersonal communications
  • 10 years’ technical experience working for a top 10 US bank
  • 10 years’ experience collaborating with the following functions: a) infrastructure b) application development c) application support d) business unit risk management e) technology risk f) audit and g) external auditors
  • 10 years’ experience collaborating with the following peer functions in corporate cyber security
  • 10 years’ experience managing the remediation of regulatory matters and internal findings
  • 10 years’ experience in strategic planning and applying industry best practices to operations (NIST, FFIEC)

Preferred Qualifications:

  • Master’s degree
  • Understand multiple approaches to designing IAM technical solutions
  • Experience in waterfall and agile project management methodologies
  • Experience managing contracts for IAM managed service providers
  • CISSP Certification

Additional commentary

General Description of Available Benefits for Eligible Employees of Truist Financial Corporation: All regular teammates (not temporary or contingent workers) working 20 hours or more per week are eligible for benefits, though eligibility for specific benefits may be determined by the division of Truist offering the position. Truist offers medical, dental, vision, life insurance, disability, accidental death and dismemberment, tax-preferred savings accounts, and a 401k plan to teammates. Teammates also receive no less than 10 days of vacation (prorated based on date of hire and by full-time or part-time status) during their first year of employment, along with 10 sick days (also prorated), and paid holidays. For more details on Truist’s generous benefit plans, please visit our Benefits site. Depending on the position and division, this job may also be eligible for Truist’s defined benefit pension plan, restricted stock units, and/or a deferred compensation plan. As you advance through the hiring process, you will also learn more about the specific benefits available for any non-temporary position for which you apply, based on full-time or part-time status, position, and division of work.

Truist supports a diverse workforce and is an Equal Opportunity Employer that does not discriminate against individuals on the basis of race, gender, color, religion, citizenship or national origin, age, sexual orientation, gender identity, disability, veteran status or other classification protected by law. Truist is a Drug Free Workplace.

EEO is the Law, [Pay Transparency Nondiscrimination Provision](https://www.dol.gov/sites/dolgov/files/OFCCP/pdf/pay-transp_ English_formattedESQA508c.pdf), and E-Verify.

Summary and company overview

Role Summary

A role that is responsible for leading portions of the identity management and access control functions as described by industry best practices such as NIST and FFIEC. This will include a subset of the following sub-functions: a) request b) provisioning c) deprovisioning d) normal access e) privileged access f) attestations g) identity governance administration h) identify management platforms i) production support j) authentication k) authorization and l) cloud.

Company Overview

NA

Apply now