Identity and Access Management Leaderother related Employment listings - Beachwood, OH at Geebo

Identity and Access Management Leader

Job SummaryThe Senior Manager Identity and Access Management (IAM) is responsible for leading Eaton's Enterprise IAM program, setting and delivering on IAM strategies, services, and solutions globally and at scale.
The Senior Manager must balance cybersecurity risk and business needs while executing their resposibilities and prioritizing investments.
Job ResponsibilitiesSet the strategy:
Authors and champions the identity management and access management strategies to enable digitial evoluation and address cybersecurity risk, communicating at a senior leadership level.
Evaluates industry technologies and trends to shape design of services in consideration of cost and capability.
Design and deliver services:
Delivers enterprise-scale identity management and access management solutions to enable innovation while complying with international laws, government regulations, and cybersecurity best practices.
Support the services:
Ensures continuous delivery of identity management and access management services globally, managing all aspects from architecture to support.
Lead the organization:
Lead the IAM team to ensure consistent and high-quality service delivery in support of cyber security and business goals.
Qualifications :
QualificationsBachelor's degree from accredited institutionMinimum of 10-15 years of experience in information technology of information securityAt least 5 years in leadership roleExpert knowledge in service development, technology product development and program managementStrong leadership, communication, organization skills.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.