What are the responsibilities and job description for the Identity and Access Management Engineer position at Tryfacta, Inc.?
Looking for State client or State University Experience and Local To MD
DESCRIPTION OF SERVICES
Job Summary:
Job Profile Summary:
Under general supervision and/or direction, the incumbent is responsible for the planning, building,
delivery and support of the Identity and Access Management (IAM) program. This position will provide
direction and guidance to the development, specifications and communications of the IAM application
and architecture, and provide in-depth technical consultation to the College units, departments, and OIT
management, and assist in developing plans and direction for the integration of information security
requirements.
Essential Functions:
Identity and Access Management
• Design, implement, and manage identity services solutions, including authentication,
authorization, and identity lifecycle management to provide a strong IAM program.
• Ensure the integrity and security of the College's identity data.
• Identify and evaluate complex business and technology risks, internal controls that mitigate risks,
and related opportunities for internal control improvement.
• Develop and maintain Role-Based Access control (RBAC), Attribute-Based Access control (ABAC),
and least-privilege models to reduce access risk.
• Integrate systems with Single Sign-on (SSO) and Multi-Factor Authentication (MFA) using SSO
and MFA technologies.
• Implement and manage Privileged Account Management (PAM) controls including credential
vaulting and session monitoring.
• Monitor, investigate, and respond to IAM-related incidents, abnormal login behavior, and
security alerts.
• Maintain detailed documentation of IAM architecture, configurations, integrations, and process
f
lows.
• Ensure IAM alignment with regulatory, audit, and compliance requirements across the
organization.
• Identify the broader impact of current decisions related to user access, data access and
information security
Strategic Leadership
• Envisions organizational outcomes and facilitates alignment with them.
• Aligns IAM processes across the organization, and develops and documents standards for
organizational use.
• Understands business and information technology management processes and demonstrates
advanced understanding of business processes, internal control risk management, IT controls
and related standards.
• Lead the planning, development, and execution of IAM projects, ensuring they are completed on
t
ime and within budget and aligned with IAM best practices.
• Collaborate with security architecture, application owners, and infrastructure teams to design
scalable and secure IAM solutions.
• Define and track IAM metrics, KPIs, and maturity indicators to support continuous improvement.
• Advise senior management on IAM-related risks and security posture.
Awareness, Training and Other Communications
• Fosters an understanding of the need for and application of the IAM system, and facilitates
decision making with the end users.
• Builds and nurtures positive working relationships with College units and departments.
• Identifies opportunities to improve engagement with the College units and departments.
Perform other duties as assigned.
Required Knowledge, Skills, and Abilities
• Broad knowledge of computer security issues, requirements, solutions, and trends, especially in
the higher education environment.\
• Knowledge of applicable business processes and operations of customer organizations.
• Knowledge of new and emerging information technology (IT) and information security
technologies.
• Knowledge of risk management processes, including steps and methods for assessing risk.
• Knowledge of system lifecycle management principles, including software security and usability.
• Knowledge of critical information technology (IT) procurement requirements.
• Strong interpersonal and communication skills, plus the ability to achieve goals through
influence, collaboration, and cooperation.
• Demonstrated ability to work effectively with an array of constituencies in a community that is
both demographically and technologically diverse.
• Ability to think critically and analyze information and situations, present findings and make
recommendations; ability to turn data into information and present it in a meaningful manner.
• Ability to analyze issues and solve sensitive and complex problems under pressure. Skilled in
interpersonal communication and conflict resolution.
• Excellent written and verbal skills.
• Excellent presentation skills and experience in public speaking or training.
Required Education and Experience
• Bachelor's degree from an accredited college or university with course work in computer
science, information systems, cybersecurity, or a related field, and/or any combination of
education, training, and experience that provides the required knowledge, and expertise to
perform the essential functions of the position.
• Four years of progressively responsible experience in the management of identity and access
management, or similar experience managing complex applications, projects or systems.
• Proven experience in designing and implementing IAM solutions in a complex organization.
• Experience dealing with complex risk-related issues with managing vendor relationships,
information security or regulatory compliance programs, and audits.
Competencies:
• Decision Making
o Decisions may affect a work unit or area within a department. May contribute to
business and operational decisions that affect the department.
• Problem Solving
o Problems are varied, requiring analysis or interpretation of the situation. Problems are
solved using knowledge and skills, and general precedents and practices.
• Independence of Action
o Results are defined and existing practices are used as guidelines to determine specific
work methods and carries out work activities independently; supervisor/manager is
available to resolve problems.
• Communication and Collaboration
o Contacts and information are primarily within the job’s working group, department
and/or campus.
o Contacts and information sharing are external to the job’s department, but internal to
the campus/campuses (i.e. other departments/campuses, central
administration/services such as Human Resources, Payroll, Finance, Facilities, Mail
Services, Student Services, etc.)
o Contacts and information sharing are internal/external to the College, for the primary
reason of scheduling, coordinating services, collaborating, etc.
Required Industry Certifications
• At least one relevant certification, e.g. Certified Identity and Access Manager (CIAM), Certified
Identity Management Professional (CIMP), Certified Identity Governance Expert (CIGE), Certified
Information Systems Security Professional (CISSP)