Interview : Virtual
Visa : USC, GC and GC EAD
Onsite : Chicago, IL
Domain : Commercial Insurance
JD : We're seeking an experienced IAM practitioner to lead Phase 2 application deep-dives within the ECM Change Management Audit Remediation program and to coordinate application team responses end-to-end. This role will facilitate and document what constitutes "privileged access" with application and service owners, drive data collection and analysis, and own all IAM aspects of project execution for the IAM workstream-including alignment to our policy and Privileged Account Management (PAM) standard. Phase 2 focuses risk-based deep-dive assessments of applications prioritized by business criticality, regulatory impact, data classification, foundational system status, and usage profiles
Skills : Lead assessments & coordination
Plan, schedule, and run deep-dive assessment sessions with application and service owners; tailor question sets to hosting model (on-prem / SaaS), access model, and criticality.
Drive application response completion (surveys, interviews, workshops) and ensure evidence is collected and stored in approved repositories (e.g., CMDB / SharePoint / ServiceNow).
Define and document "privileged access" per app (roles / entitlements, credentials, break-glass accounts, service accounts / keys, cloud admin roles), aligned to the PAM Standard.
Map entitlements to accounts and controls (vaulting, rotation, JIT, session management, MFA) and identify remediation needs when gaps are found.
Analysis, risk scoring & reporting
Apply risk-based prioritization using the Phase 2 model (business criticality, regulatory / data classification, foundational status, users / usage) and document rationale in CMDB attributes.
Produce application-level deep-dive reports (current state, control gaps, recommendations, target dates) and portfolio rollups for weekly program governance.
Standards alignment & operationalization
Ensure outcomes align to the IAM Policy and PAM Standard definitions and control expectations; raise exceptions only when justified with mitigating controls and an action plan.
Partner with app teams to establish / confirm privileged access scopes for upcoming PAR / PUAR campaigns and certify in-scope accounts accordingly
Tooling & integrations
Coordinate with platform owners to onboard / vault privileged credentials and related secrets in CyberArk; ensure Okta access patterns and SailPoint IIQ governance reflect agreed entitlements.
Ensure CMDB attributes and ServiceNow IRM records reflect final risk ratings and control states for assessed applications.
Education and Experience
Bachelor's degree in Computer Science or equivalent experience.
Typically a minimum of four years' experience in security aspects of multiple platforms, operating systems, software communications and network protocols.
Applicable certifications preferred.
Candidate Full Name (As per passport) Demand ID / Position Present Location (City & State) Willing to Relocate (Yes / No) Work Authorization and Validity Last 4 of SSN Cell Number E-mail ID LinkedIn Profile Link Notice Period Required (post-selection) Total Onsite Experience (working in USA) Overall IT Experience of Candidate Education Details DOB (MM / DD / YYYY) Open for CTH (Yes / No)
Iam • Chicago, IL, United States