Job Description : Responsibilities : -Operate with the Technical Leads to ensure ambitious delivery and sustainability objectives are met, aligned with the clear product vision across the organization-Communicate with high efficacy to key stakeholders, peers, and the wider CTO organization-Aid in facilitating the end-to-end product deployment and maintenance, and onboarding of business applications -Ensure alignment of and undertake product features and stories, , review, give feedback, and prioritize user stories according to timelines-Continuously improve backlog with the team, ensuring all items are clearly described, estimated, and prioritized-Ensure customer-driven design considering user pain points & usability test results, using market & industry knowledge as well as continual research, to deliver a well-positioned product-Analyze, review, and assess features and provide valuable feedback for the team and Product Owner-Drive team specific sprint and release plans together with the Scrum Master and organizational technology teams-Exercise strong decision-making mandate from executive group to own product end-to-end-Work with peer technical leads and Product Owner to construct modular and reusable solutions, and drive adoption through integration and transition-Collaboratively design, implement and run enterprise IAM solutions for both workforce and customer-Advanced understanding of business processes, internal control risk management, IT controls and related standards.
Assist in requirements gathering and analysis.-Manage multiple engagements and competing priorities in a rapidly growing, fast-paced, results-based team environment-Ensure adherence to continuous improvement practices as required to meet quality / time to market imperatives Skills / Qualifications : -Multiple program / project lead expertise -Ability to work on own initiative and drive time definite deliverables pertaining to enhancing an overarching IAM architecture, deploying new infrastructure, consolidating and retiring legacy products and services-Expertise in secure Identity architectures and frameworks-In depth knowledge of SSO and Federation platforms -Strong experience supporting vendor security solutions in a Unix / Linux environment-Core competencies in security hardening of Identity platforms and Directories-High degree of proficiency in conveying technical tenets to all levels of org / audience -Deep knowledge specifically within the Security and Identity arena, including but not limited to RBAC, Authentication, Authorization, least privilege enforcement-Strong, demonstratable capabilities with at least one high-level programming language and a scripting language (# / .
Net / Java / Python / PowerShell)-Wide exposure to audit and compliance engagements and ability to field and tend to PCI / SOX / Fed regulatory requirements and remedial action plans-Solid knowledge of industry trends, user demands, and pain points to be able to create a high value product vision-Strong problem solver with ability to lead the team to push the solution and progress-Experimental mindset to drive innovation -Ability to work independently in a fast paced, unstructured environment-Innovative thinking with a passion for problem-solving-Exposure and skills with SSO, federation, and risk product offerings / vendors ()-Any exposure to, or skillsets within SailPoint, Splunk, Ping / DUO / Transmit / ForgeRock, Vintela / Unix platform bridging solutions-Experience with a disparate environment, ratification thereof, in addition to facets of complex and comprehensive migration and integration Experience : -5-7+ years of experience collaborating on projects through the full development lifecycle - specifically IAM solutions-A history of embracing and incubating emerging technology and open-source products-Strong background in engineering and operationally running large scale IAM infrastructure-Identity Management experience in all the following areas : -Single Sign-On, Identity Federation, Consumer Identity, and Multi-Factor Authentication-Identity Governance and Administration, User Provisioning, Access Certification, Identity Analytics, Role-Based Access Control-Privileged Access Management