IMF Identity and Access Management (IAM) Governance Lead-ITDSG 2024 International Jobs

  • Location:
  • Salary:
    negotiable / YEAR
  • Job type:
    OTHER
  • Posted:
    6 months ago
  • Category:
  • Deadline:
    11/07/2024

JOB DESCRIPTION

JOB DETAILS:

International Monetary Fund Identity and Access Management (IAM) Governance Lead-ITDSG United States IMF Jobs 2024

International Monetary Fund looking for “Identity and Access Management (IAM) Governance Lead-ITDSG”. Applicants with an Advanced degree may apply on or before 11-Jul-24.

The International Monetary Fund has published a job vacancy announcement on 20-Jun-24 for qualified applicants to fill in the vacant post of Identity and Access Management (IAM) Governance Lead-ITDSG to be based in Washington D.C., United States. For more jobs, please visit https://unjoblink.org

Company Name: International Monetary Fund

Job Title: Identity and Access Management (IAM) Governance Lead-ITDSG

Duty Station: Washington D.C., United States

Country: United States

Application Deadline: 11-Jul-24

Responsibilities: 

1. Designs and operationalizes a tailored IAM governance framework in collaboration with IT and business departments, and in alignment with the IMF’s Business Technology Strategy, ensuring clear delineation of IAM roles and responsibilities.

2. Oversees identity lifecycle and access governance activities including developing, maintaining, and facilitating the adoption of IAM policy standards, processes, and procedures.

3. Evaluates the effectiveness of the identity lifecycle management processes and risk reduction measures, advising on gaps in technology stack, process improvements, and service delivery.

4. Collaborates with business and IT stakeholders across the IMF to understand access needs, ensuring IAM strategies support business processes and productivity.

5. Engages with key stakeholders to ensure seamless collaboration on IAM-related topics and establishes central communication platforms for continuous information sharing.

6. As a second line function, oversees the implementation, integration and operations of IAM tools and technologies, ensuring they meet the IMF’s business and security requirements.

7. In close collaboration with Enterprise Architecture, Enterprise Security Architecture and Engineering teams, influences the IAM enterprise architecture and principles and drives the IAM strategic technology roadmap.

8. Leads the IAM governance committee, communicating compliance expectations, providing strategic direction, and facilitating discussions and decision-making processes related to IAM policies, standards, and practices.

9. Identifies IAM-related risks and collaborates with Operational Risk partners on access-related compliance monitoring and testing activities.

10. Oversees foreseeable enterprise-wide or departmental changes that may impact the IAM program and/or identity lifecycle operations.

11. Regularly monitors the IAM program’s operational health and maturity through key metrics and risk reporting. Evaluates the effectiveness of identity lifecycle management processes and risk reduction measures.

12. Leads the delivery of IAM governance training programs for IT, security teams, and end-users to foster awareness and adherence to IAM policies and procedures.

Requirements:

Minimum Qualifications

Advanced degree in information security, computer science, engineering, mathematics, or related field of study plus a minimum of 8 years of progressive information security work experience; or a bachelor’s degree in information security, computer science, engineering, mathematics, or related field of study and minimum of 14 years of progressive information security work experience.

  • Candidates should possess one or more of these certifications— CISSP, CISM, SABSA, CEGIT.
  • Experience leading IAM related programs in mid to large organizations.

Relationship Management Skills

  • Ability to establish and maintain effective partnerships and working relations in a multi-cultural, multi-ethnic environment with sensibility and respect for diversity.
  • Demonstrates ability to represent the department fully and successfully to internal and external audiences.

Work Management Skills

  • Navigates through obstacles and challenges effectively and demonstrates commitment to deliver successful results.
  • Ability to lead, guide and mentor a diversified team of information security experts.
  • Ability to collaborate with IT and business colleagues to prioritize work, develop roadmaps, enhance services, and contribute meaningfully to the department’s service delivery.
  • Ability to balance multiple priorities and demands.
  • Analytical skills that enable synthesis of inputs from many sources and allow for strategic thinking and tactical implementation.
  • Interpersonal skills that create openness and trust among colleagues.
  • Facilitation and conflict management skills that enable effective working relationships.
  • Spoken and written communications that are compelling, convincing, and reassuring, and skills to articulate complex technical ideas to non-technical stakeholders.
  • Pragmatic security expert with an inherent ability to balance security demands with business reality.

Technical Skills

  • Deep experience advising strategies related to authentication, privileged access management, and IAM enforcement in public clouds (Azure-preferred, AWS) are essential for this role.
  • Robust understanding of and direct experience delivering IAM-related zero trust capabilities.
  • Experience deploying and handling Policy-Based Access Control (PBAC).
  • Experience with a variety of IT security and related concepts or technologies (e.g., SSO, ADFS, MFA, Privilege Access Management, RBAC/ABAC, PKI, etc.)
  • Experience in implementing least privilege access, segregation of duties (SoD), and just-in-time (JIT) access controls to minimize potential security risks.
  • Experience with one or more IAM platforms like Microsoft Azure Active Directory, Entra ID, Okta, SailPoint, Saviynt, and CyberArk.
  • Understanding of security protocols such as OAuth, OpenID Connect, SAML, and Kerberos, and how they are applied in access management.

 

This job has expired.