Role Summary
Associate Manager Cyber Security (IAM)
secure, scalable, and compliant identity solutions
IAM platforms, vulnerability management, security monitoring, compliance reporting, endpoint security, cloud security, edge security, DLP, and emerging security technologies
Key Responsibilities
Leadership & Operations
- Lead and manage a team of security engineers, ensuring high performance, skill development, and continuous improvement.
- Allocate resources effectively to meet operational objectives and delivery milestones.
- Provide ongoing training, coaching, and development for direct reports.
- Act as a key point of contact for stakeholders, peers, vendors, and customers to improve cross-functional collaboration.
IAM Strategy & Transformation
- Lead IAM transformation initiatives across
Customer Identity Management, Workforce Identity / IGA, and Access Management / SSO
platforms. - Drive modernization of identity platforms to improve security, scalability, automation, and user experience.
- Architect and implement secure, enterprise-grade IAM solutions aligned with business and compliance requirements.
Access Governance & Authentication
- Oversee identity lifecycle management, including provisioning, de-provisioning, role management, and access reviews.
- Enforce
least-privilege access principles
and strong governance controls. - Implement and optimize
SSO, MFA, and authentication mechanisms
to balance security and usability.
Security Engineering & Compliance
- Manage security engineering operations including vulnerability management, security scanning, monitoring, and compliance reporting.
- Ensure IAM practices comply with regulatory standards such as
GDPR, SOX
, and internal security policies. - Identify identity-related risks and implement mitigation strategies to minimize exposure.
Incident Response & Continuous Improvement
- Provide expert support for IAM-related incidents and troubleshooting, ensuring timely resolution.
- Monitor IAM performance metrics and drive continuous enhancements in automation, scalability, and operational efficiency.
- Stay current with emerging security threats, technologies, and legislative changes impacting identity and access management.