Uploaded 06/06/2018 | Identity Program Management Lead | Detroit, MI

Uploaded 06/06/2018 | Identity Program Management Lead | Detroit, MI

ISSA's picture

Apply Here:http://jobs.pwc.com/ShowJob/Id/881552/Identity%20Management%20Program%20...

Contact Kristy Bellingham for any questions concerning this position: kristy.bellingham@pwc.com

PwC/LOS Overview
PwC is a network of firms committed to delivering quality in assurance, tax and advisory services.

We help resolve complex issues for our clients and identify opportunities. Learn more about us at www.pwc.com/us.

At PwC, we develop leaders at all levels. The distinctive leadership framework we call the PwC Professional (http://pwc.to/pwcpro) provides our people with a road map to grow their skills and build their careers. Our approach to ongoing development shapes employees into leaders, no matter the role or job title.

Are you ready to build a career in a rapidly changing world? Developing as a PwC Professional means that you will be ready
- to create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers.

It takes talented people to support the US firm of the largest professional services organization in the world. Not all of us work directly with external clients. Some of our best people choose to apply their talents inside PwC.

As part of Internal Firm Services, you're serving an organization on par with many of our external clients. Our Internal Firm Services team consists of first-rate marketers, human resource professionals, computer technologists, knowledge managers, accountants, financial planners, administrators and leaders. Internal Firm Services staff are the people who make it work for the people who make it work for our clients.

Job Description
The Cyber pillar is responsible for cyber service transition, cyber service management, cyber defense, cyber threat management, security operations, and identity and access management.

The IAM team is made up of 3 core areas:
- Identity Management Administration
- Identity and Access Management Engineering
- Privileged Access Management

Each of these areas work together to successfully manage the identity lifecycle of new joiners, movers and leavers across the PwC network of firms.

Position/Program Requirements
Minimum Year(s) of Experience: 8 years of progressive professional roles involving information security and/or IT management.

Minimum Degree Required: High School Diploma or GED

Degree Preferred: Bachelor's degree

Knowledge Preferred:
Demonstrates thought leader-level knowledge of:

- Identity and Access Management operations principles and a broad understanding of related functions, applied in creative ways in the support of and integration with key business and strategic priorities;
- Leading the formal development of intellectual capital within the function and support integration of intellectual capital across multiple functions;
- Translating overall vision and the function’s business strategy and plan by leading or managing others and performing work with a high degree of independence;
- Influencing others internally and externally through both direct and indirect reports
- Building, deploying, and developing teams and projects within a function or across functions;
- Leading a team to generate a vision for IAM and execute against the overall strategy;
- Building and maintaining relationships across the network of firms to effectively deliver Identity and Access management activities on behalf of NIS; and,
- Executing tasks aligned to IAM with autonomy.

Skills Preferred:
Demonstrates thought leader-level abilities with, and a proven record of success in:

- Reviewing access requests from users across the PwC Network of firms;
- Conducting Analysis of users’ needs in order to make appropriate decisions for provisioning and de-provisioning;
- Working with Identity Management Tools in order to administer appropriate access to users;
- Conducting Identity Hygiene activities in order to ensure stale accounts are removed from the Identity Management environment;
- Defining Identity governance in line with legal and regulatory frameworks;
- Engaging with stakeholders to review access rights against operating manuals;
- Transitioning, maintaining, or using Security Technologies such as SIEM, Endpoint protection, Data Loss Prevention, IAM products, Forensic tools etc.;
- Working in a central technology service organization;
- Working in a complex, matrix organization; and,
- Working with multiple stakeholders across functional and technical skillsets.