What are the responsibilities and job description for the Cybersecurity & IAM Leader position at ApTask?
Job Details
Role Cybersecurity & IAM Leader
Location: Overland Park, Kansas OR Seattle WA (Day1 Onsite)
Job Summary
We are seeking a highly experienced and strategic Senior Cybersecurity & IAM Leader with 20 years of experience to drive cybersecurity and Identity & Access Management (IAM) initiatives within a large-scale telecom organization. This role requires expertise in cyber resilience, IAM frameworks, and security governance, with the ability to present security roadmaps to senior leadership and lead enterprise-wide adoption of security best practices.
Roles and Responsibilities
- Mentor analysts, engineers, and architects to promote professional growth and align team efforts with organizational goals.
- Inspire employees to achieve results by connecting individual and team goals to broader business objectives.
- Foster a culture of recognition, collaboration, and continuous improvement.
- Provide meaningful feedback, support development, and create an environment where employees feel valued and respected.
- Provide expert consultation on cybersecurity aspects of applications, 5G networks, and critical telecommunications technologies.
- Develop and implement an enterprise-wide IAM strategy, including role-based access control (RBAC), privileged access management (PAM), and identity governance (IGA).
- Manage IAM solutions such as
- Mandatory - Cyberark, Delinea, HashiCorp Vault, Microsoft Entra ID, SailPoint
- Optional - Okta, ForgeRock, BeyondTrust, and Ping Identity.
- Implement Zero Trust security principles, multi-factor authentication (MFA), and passwordless authentication strategies.
- Oversee privileged access management (PAM) solutions to enforce least privilege principles and prevent credential abuse.
- Drive IAM automation using PowerShell, Python, Terraform, and other automation tools to enhance operational efficiency.
- Design and implement automated IAM governance frameworks for cloud, 5G, and containerized environments.
- Leverage AI/ML for adaptive authentication and behavior-based anomaly detection in identity security.
- Develop and enforce IAM strategies for securing 5G network components and telecom applications.
- Implement IAM-based access controls for IMS Core, Packet Core, and messaging systems to prevent unauthorized access.
- Lead IAM initiatives for securing hybrid telecommunications environments integrating cloud-native applications with legacy systems.
- Develop IAM policies to secure cloud-native applications and infrastructure-as-code (IaC) deployments.
- Ensure compliance with cloud security best practices, including SSO, identity federation, and conditional access policies.
- Manage vendor relationships to implement best-in-class IAM and privileged access management (PAM) solutions.
- Establish IAM governance models and define IAM-related KPIs and metrics for performance tracking.
- Lead IAM and cybersecurity projects driven by internal and external stakeholders.
- Represent IAM initiatives in senior leadership, risk committees, and compliance reviews.
Skills & Qualifications
- Ability to present IAM roadmaps and security strategies to C-level executives.
- Experience managing large-scale IAM projects and vendor relationships.
- Expert-level knowledge in IAM technologies: Microsoft Entra ID, Okta, SailPoint, CyberArk, Ping Identity, ForgeRock, BeyondTrust.
- Privileged Access Management (PAM) expertise: CyberArk, HashiCorp Vault, Thycotic, Delinea.
- Experience with IAM automation & orchestration using Python, PowerShell, Terraform, and API integrations.
- Cloud IAM security (AWS IAM, Azure AD, Google Cloud Platform IAM, multi-cloud identity federation).
- Zero Trust Security, MFA, passwordless authentication, adaptive authentication.
- IAM policy enforcement, compliance audits, and access certification processes.
- Strong understanding of IAM integration with ITSM (ServiceNow), HR systems, and CI/CD pipelines.
- Federated identity management, Single Sign-On (SSO), and Identity Federation protocols (SAML, OAuth, OpenID Connect).
- Experience with identity governance and access management (IGA) frameworks.
- Bachelor s degree in computer science, Information Technology, or related field.
- Required certifications: At least one of the following: CISM / CISSP
- Strong communication and presentation skills, with the ability to effectively interact with technical and non-technical stakeholders.
Experience
- 20 years of professional experience in cybersecurity, with a strong focus on IAM/PAM architecture, deployment, and delivery.
- Proven experience leading teams and managing complex projects in enterprise environments.
- Demonstrated ability to manage multi-vendor environments and collaborate with cross-functional teams.
- Experience in delivering IAM/PAM solutions aligned with regulatory compliance and risk management requirements.
Additional Skills
- Strong leadership and team management abilities, fostering a culture of excellence and collaboration.
- Exceptional problem-solving skills with a customer-centric approach.
- Ability to manage multiple critical projects simultaneously while maintaining high-quality outcomes.
- Adept at conducting workshops, leading technical discussions, and facilitating training sessions for teams and stakeholders.
- Flexibility and adaptability to work in dynamic environments and take on responsibilities outside the primary area of expertise.