Information Security IAM Lead
Liberty Street, United States
Santander
Our purpose is to help people and businesses prosper. We strive to make all we do Simple, Personal and Fair.Information Security function provides capabilities to efficiently safeguard information and technology assets for business and customer use.
This individual will be a key member assessing and prioritizing risk across the organization, compliance with information security policies, and the development and reporting of information security metrics related to Identity and Access Management (IAM), and Privileged Access Management (PAM) processes.
IAM is a capability that supports Technology and Business teams by facilitating and ensuring that the appropriate personnel have access to authorized systems and applications. IAM encompasses the practices, technologies, and teams required to carry out, support, and enforce various functions, including access requests, access provisioning/de-provisioning, access certifications, and access control.
Responsibilities include:
- Work closely with the New York Information Security and Santander US Identity and Access Services teams, and Business Owners to address any New York related IAM, PAM and Single Sign On (SSO) related issues including related regulatory requirements to mature the information security program.
- The submission, approval, creation, and removal of accounts, entitlements, application roles, and business roles follows documented processes and procedures with clearly defined roles and responsibilities.
- User Active Directory accounts unused for the previous 90 calendar days are reviewed for inactivity and, if confirmed to be inactive, disabled or removed.
- All certified access rights are documented and current. Technology Platform Owners identifies users whose access rights violate the Separation of Duty (“SoD”) rules and are reviewed with managers/supervisors. Any exceptions are documented, risk-assessed, and formally approved within 30 business days of the management review.
- The recertification process is performed as a formal review of information assets to confirm that all granted access rights entitlements remain valid, updated, and in full compliance with the Segregation of Duties (SoD) rules and Principle of Least Privilege.
- Execution of a recertification for information assets and collecting all recertification evidence that confirms access rights entitlements have been validated within SLAs.
- Review the access rights associated with default privileged roles and verify that they match the definition and adhere to “minimum required privilege” for applications, operating systems, databases, and network devices.
- Identification of privileged accounts to be carried out in consultation with Technology Platform Owners, Application Owners, Business, and Technology Infrastructure teams. Privileged accounts include “super users,” service accounts, local administration accounts, emergency accounts, and application-specific administrative accounts.
- All assets are onboarded to the Privileged Access Management System (PAMS) such as CyberArk and a process is defined to periodically review and recertify the accounts including groups they belong to.
- Perform risk assessments and control gap analysis against Information Security Policies and Standards.
- Support coordination for closure of gaps identified with Standard Requirements and Cyber Risk Assessment methodology.
- Analysis, evidence gathering and documenting compliance with Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment Tool (CAT), NYDFS 23 NYCRR 500 cybersecurity or any other regulatory requirements.
- Create, organize, and articulate summarized risk findings that are clear and actionable by business stakeholders, reduce risk by helping to prioritize and drive remediation efforts throughout the organization, and contribute to risk management, treatment, and reporting process efforts to protect data assets.
Education:
- Bachelor’s or undergraduate degree in Information Systems or Information Technology or equivalent work experience in Information Technology, Information Systems, or equivalent field.
Skills and Experience:
- Preferably 9-12 years’ experience in information security, identity and access management, privileged access management, Single Sign On, Azure Active Directory integration, Cloud Framework, IT audit, or information technology risk management
- Experience with risk assessments and compliance of major regulatory initiatives (e.g., SOX, NYDFS)
- Experience with cyber security and information security program management and frameworks (e.g., NIST CSF, ISO/IEC 27000, etc.)
- Possess the ability to perform under pressure in a challenging environment.
- A hunger to learn and take on challenging opportunities contributing to the success of information security team.
- Possess a highly developed sense of personal accountability and follow-through with an ability to effectively prioritize multiple tasks and projects.
- Proven ability to work in team environment.
- Must take ownership, demonstrate a sense of urgency, and ensure accuracy and quality.
- Bilingual in Spanish is a plus.
EEO Statement: At Santander, we value and respect differences in our workforce. We actively encourage everyone to apply.
Santander is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, genetics, disability, age, veteran status or any other characteristic protected by law.
Working Conditions: Frequent Minimal physical effort such as sitting, standing and walking. Occasional moving and lifting equipment and furniture is required to support onsite and offsite meeting setup and teardown. Physically capable of lifting up to fifty pounds, able to bend, kneel, climb ladders.
Employer Rights: Employer Rights: This job description does not list all of the job duties of the job. You may be asked by your supervisors or managers to perform other duties. You may be evaluated in part based upon your performance of the tasks listed in this job description. The employer has the right to revise this job description at any time. This job description is not a contract for employment and either you or the employer may terminate at any time for any reason.
The base pay range for this position is posted below and represents the annualized salary range. For hourly positions (non-exempt), the annual range is based on a 40-hour work week. The exact compensation may vary based on skills, experience, training, licensure and certifications and location.
Base Pay Range
Minimum:
$101,250.00 USDMaximum:
$175,000.00 USDTags: Active Directory Audits Azure Cloud Compliance Cyberark FFIEC IAM NIST Risk assessment Risk management SLAs SOX SSO
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.