Technical Manager, Identity and Access Management (IAM)

Digital River
Slough
9 months ago
Applications closed

Related Jobs

View all jobs

Microsoft Entra and Purview Engineer/ Architect

IAM Governance Manager

Programme Manager (Security)

Senior Manager - Cyber Security

Identity Security Analyst

Technical Security Consultant / Presales

Job Description

What You'll Do:

We are seeking a motivated individual to join our Identity and Access Management (IAM) team. This position will help safeguard the organization's information by implementing controls, developing standards, and design solutions to ensure we successfully identify, authenticate, and authorize access to critical data and applications. In this role, your skills, experience, and knowledge of IAM technologies and concepts will help the organization balance policy, regulatory and auditing compliance requirements with end user experience through application on-boarding, IAM workflow development, process improvements, and supporting highly available application environments.

The IAM Technical Manager, as a vital part of our Information Security Team, will lead the Identity and Access Management program. They will define the strategy, implement that strategy, and modernize Digital River’s IAM systems and processes. This role oversees systems and tools related to identity lifecycle, identity governance, privileged access management, and overall access management. This individual will also take on responsibilities related to information security, outside of the IAM program. This is a hands-on-keyboard role. The ideal candidate will not only possess strong technical skills and a strategic mindset, but they will also have experience building and leading high-performing teams in dynamic environment.

40% -- Leadership & Engineering

Guiding, mentoring, and providing training to cultivate a high-performing team, consisting of three full time employee and some contractors Define the strategy - design and implement security architectures, processes, and solutions to protect Digital River’s infrastructure and identities Enable automation – develop automation focused on identity lifecycle Research requirements to determine system feasibility, costs, benefits, or functional capabilities Develop, implement, and administer security and identity related policies and procedures Remain informed on the most recent advancements in technology and security trends to remain knowledgeable about emerging threats and industry best practices

30% -- System Security Operations

Triage and support operational issues involving systems and tools Execute on periodic entitlement reviews and audit support related to PCI and SOC2 audits across the organization Conduct vulnerability assessments on Digital River’s software, architecture and vendors as needed Perform various manual tasks related to the provisioning and de-provisioning of user accounts Performs system maintenance on all security tools and identifies areas of improvement

30% -- Technical Support

Consult and collaborate with the business as a subject matter expert on security and IAM Assist with PCI and SOC2 related security audits as needed Participate and oversee the management of a ticket que and fulfilling support tickets within defined SLAs

Qualifications

What You'll Need to Succeed: 

Required: 

2+ years of experience in a team lead or people management position 5+ years of experience in Information Security and/or Identity & Access Management design and engineering Experience managing Identity and Access Management in AWS Experience with AWS IAM Identity Center, Microsoft Azure, Veza, OKTA, IdentityIQ, secrets management, or other equivalent IAM technologies Experience with automating manual tasks related to IAM systems and tools Coding / scripting skills – Ability to add, update or troubleshoot code to resolve issues, create efficiencies or integrate systems is a plus Experience working with systems (UNIX/Linux/Windows) and directories (LDAP, etc.) Experience with IAM Technologies and Processes (Federated Authentication, Web Single Sign On, SAML/OAuth, OpenID Connect, Web Access Management (WAM), Identity Governance and Administration (IGA), Multi-Factor Authentication (MFA), Privileged Access Management (PxM/PAM), etc. Solid understanding of security principles, tools, and processes Problem solving and troubleshooting skills, and ability to multitask on competing priorities Exceptional communication and interpersonal skills with the ability to influence and collaborate with diverse stakeholders Strong project management and organizational skills, with the ability to deliver high-quality results within budget and on schedule

Preferred: 

Industry standard certification such as CISSP, CISA, or CISM Bachelor’s degree in Computer Science/Security Engineering/Related field 

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.

10 Must-Read Cyber Security Books for UK Professionals: Boost Your Career and Stay Ahead of Threats

With rapid advancements in digital infrastructure, cloud computing, and the Internet of Things (IoT), cyber threats continue to evolve at lightning speed. For organisations across the UK—and globally—robust cyber security is no longer optional: It’s a strategic imperative. From healthcare and finance to government agencies and tech start-ups, every sector needs skilled professionals to safeguard critical data and protect users. If you’re looking to break into or advance within the cyber security industry, staying updated on the latest techniques, threat landscapes, and defence strategies is paramount. One of the best ways to build and sharpen your expertise is by reading authoritative, high-quality books that combine foundational knowledge with cutting-edge insights. In this guide, we’ve compiled a list of ten books that cater to various skill levels, spanning ethical hacking and threat intelligence to secure software development and cryptography. By diving into these resources, you’ll fortify your understanding of cyber security fundamentals, explore hands-on techniques for defending systems, and gain the strategic perspective needed to excel in roles throughout the UK’s thriving cyber security landscape.

Navigating Cybersecurity Career Fairs Like a Pro: Preparing Your Pitch, Questions to Ask, and Follow-Up Strategies to Stand Out

In a world where digital threats are escalating and online infrastructure underpins nearly every aspect of our personal and professional lives, cybersecurity has swiftly become one of the most sought-after career fields. Demand for skilled cybersecurity professionals outstrips supply, both in the UK and globally. From ethical hackers and penetration testers to governance, risk, and compliance (GRC) specialists, the opportunities are extensive—and lucrative. Amidst this surge in demand, cybersecurity career fairs provide an invaluable chance to meet potential employers face-to-face, gain industry insights, and make connections that can accelerate your career trajectory. Unlike applying to countless jobs online, these events bring companies, security leaders, and aspiring candidates together under one roof. When approached with the right strategy, a single conversation at a cybersecurity fair can open the door to your dream job. In this comprehensive guide, we’ll explore how to prepare thoroughly, engage confidently, and follow up effectively after a cybersecurity career fair. By incorporating these insights into your approach, you’ll stand out from the crowd and maximise your chances of securing the perfect role in this fast-growing field.