What are the responsibilities and job description for the Cybersecurity & IAM Leader position at HAN IT Staffing Inc.?
Job Details
Role Cybersecurity & IAM Leader
Location: Overland Park, Kansas
Duration: Long
Job Summary
We are seeking a highly experienced and strategic Senior Cybersecurity & IAM Leader with 20 years of experience to
drive cybersecurity and Identity & Access Management (IAM) initiatives within a large-scale telecom organization. This
role requires expertise in cyber resilience, IAM frameworks, and security governance, with the ability to present security
roadmaps to senior leadership and lead enterprise-wide adoption of security best practices.
Roles and Responsibilities
Mentor analysts, engineers, and architects to promote professional growth and align team efforts with
organizational goals.
Inspire employees to achieve results by connecting individual and team goals to broader business objectives.
Foster a culture of recognition, collaboration, and continuous improvement.
Provide meaningful feedback, support development, and create an environment where employees feel valued
and respected.
Provide expert consultation on cybersecurity aspects of applications, 5G networks, and critical
telecommunications technologies.
Develop and implement an enterprise-wide IAM strategy, including role-based access control (RBAC),
privileged access management (PAM), and identity governance (IGA).
Manage IAM solutions such as Microsoft Entra ID, SailPoint, Okta, CyberArk, HashiCorp Vault, ForgeRock,
BeyondTrust, and Ping Identity.
Implement Zero Trust security principles, multi-factor authentication (MFA), and passwordless authentication
strategies.
Oversee privileged access management (PAM) solutions to enforce least privilege principles and prevent
credential abuse.
Drive IAM automation using PowerShell, Python, Terraform, and other automation tools to enhance
operational efficiency.
Design and implement automated IAM governance frameworks for cloud, 5G, and containerized
environments.
Leverage AI/ML for adaptive authentication and behavior-based anomaly detection in identity security.
Develop and enforce IAM strategies for securing 5G network components and telecom applications.
Implement IAM-based access controls for IMS Core, Packet Core, and messaging systems to prevent
unauthorized access.
Lead IAM initiatives for securing hybrid telecommunications environments integrating cloud-native
applications with legacy systems.
Develop IAM policies to secure cloud-native applications and infrastructure-as-code (IaC) deployments.
Ensure compliance with cloud security best practices, including SSO, identity federation, and conditional
access policies.
Manage vendor relationships to implement best-in-class IAM and privileged access management (PAM)
solutions.
Establish IAM governance models and define IAM-related KPIs and metrics for performance tracking.
Lead IAM and cybersecurity projects driven by internal and external stakeholders.
Represent IAM initiatives in senior leadership, risk committees, and compliance reviews.
Talent Fulfillment Group JD Format
Skills & Qualifications
Ability to present IAM roadmaps and security strategies to C-level executives.
Experience managing large-scale IAM projects and vendor relationships.
Expert-level knowledge in IAM technologies: Microsoft Entra ID, Okta, SailPoint, CyberArk, Ping Identity,
ForgeRock, BeyondTrust.
Privileged Access Management (PAM) expertise: CyberArk, HashiCorp Vault, Thycotic, Delinea.
Experience with IAM automation & orchestration using Python, PowerShell, Terraform, and API integrations.
Cloud IAM security (AWS IAM, Azure AD, Google Cloud Platform IAM, multi-cloud identity federation).
Zero Trust Security, MFA, passwordless authentication, adaptive authentication.
IAM policy enforcement, compliance audits, and access certification processes.
Strong understanding of IAM integration with ITSM (ServiceNow), HR systems, and CI/CD pipelines.
Federated identity management, Single Sign-On (SSO), and Identity Federation protocols (SAML, OAuth,
OpenID Connect).
Experience with identity governance and access management (IGA) frameworks.
Bachelor s degree in computer science, Information Technology, or related field.
Required certifications: At least one of the following: CISM / CISSP
Strong communication and presentation skills, with the ability to effectively interact with technical and non-
technical stakeholders.
Experience
20 years of professional experience in cybersecurity, with a strong focus on IAM/PAM architecture,
deployment, and delivery.
Proven experience leading teams and managing complex projects in enterprise environments.
Demonstrated ability to manage multi-vendor environments and collaborate with cross-functional teams.
Experience in delivering IAM/PAM solutions aligned with regulatory compliance and risk management
requirements.
Additional Skills
Strong leadership and team management abilities, fostering a culture of excellence and collaboration.
Exceptional problem-solving skills with a customer-centric approach.
Ability to manage multiple critical projects simultaneously while maintaining high-quality outcomes.
Adept at conducting workshops, leading technical discussions, and facilitating training sessions for teams and
stakeholders.
Flexibility and adaptability to work in dynamic environments and take on responsibilities outside the primary
area of expertise.