- Company Name
- Moneris
- Job Title
- Manager, Identity and Access Management
- Job Description
-
**Job Title:** Manager, Identity and Access Management
**Role Summary:**
Leads the delivery, operation, and continuous improvement of Identity and Access Management (IAM) solutions across the organization. Ensures secure, compliant, and efficient access for users, contractors, vendors, and customers while collaborating with security, architecture, and operations teams.
**Expectations:**
- Provide strategic and tactical IAM leadership with 5+ years of IAM experience and 3+ years of people management.
- Drive adoption of IAM best practices across on‑premise and cloud environments.
- Maintain high availability and security of IAM tools and processes.
- Deliver measurable improvements in access governance, privileged access, and secrets management.
**Key Responsibilities:**
- Operate and support IAM platforms (e.g., CyberArk, SailPoint, Venafi, HashiCorp, HSMs).
- Oversee daily user lifecycle (JML) activities: provisioning, de‑provisioning, and access reviews.
- Manage privileged access (PAM), identity governance (IGA), machine identity, and secrets management.
- Implement and enforce role‑based access controls (RBAC).
- Ensure IAM compliance with industry standards and regulatory requirements.
- Produce operational reports, KPIs, and metrics for leadership.
- Identify and execute process enhancements and automation opportunities.
- Provide hands‑on support for secret management (API keys, certificates, tokens).
**Required Skills:**
- Deep knowledge of IAM concepts, JML automation, RBAC, and PAM/IGA.
- Hands‑on experience with CyberArk, SailPoint connectors, LDAP/SSO, and preferably Venafi.
- Familiarity with certificate lifecycle and secrets management (e.g., HashiCorp Vault).
- Understanding of tokenization, encryption, and data protection strategies.
- Strong communication and stakeholder‑management abilities; capable of influencing cross‑functional teams.
- Analytical mindset with ability to develop and track IAM performance metrics.
**Required Education & Certifications:**
- Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field.
- Relevant certifications (e.g., CISSP, CISM, Certified Identity & Access Manager, or vendor‑specific certs) are preferred but not mandatory.