×
Register Here to Apply for Jobs or Post Jobs. X

Application Security & Authorizations Manager

Job in Chicago, Cook County, Illinois, 60290, USA
Listing for: Constellation Brands
Full Time position
Listed on 2025-12-22
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Data Security, IT Project Manager
Salary/Wage Range or Industry Benchmark: 114300 - 207800 USD Yearly USD 114300.00 207800.00 YEAR
Job Description & How to Apply Below
Application Security & Authorizations Manager page is loaded## Application Security & Authorizations Manager locations:
Rochester, New York:
Chicago, Illinois:
Canandaigua, New York:
San Antonio, Texastime type:
Full time posted on:
Posted Todayjob requisition :
R-38832
** Job Description
**** Company Summary
** We’re the producers, creators and marketers of beer, wine and spirits brands that people love. At Constellation Brands, we’re driven to push boundaries and think beyond today to deliver products and experiences that resonate now, tomorrow and well into the future. Because of this approach, we’re the fastest-growing large CPG company in the U.S. at retail, with operations in the U.S., Mexico, New Zealand and Italy.

Our premium portfolio of iconic brands like Corona Extra, Modelo Especial, Kim Crawford, Robert Mondavi, The Prisoner, High West Whiskey, and more drive industry-leading growth for us today. But we’re just getting started. Our ability to stay on the forefront of consumer trends has fueled our success since our founding in 1945 and will guide us in creating the next generation of products and experiences Worth Reaching For.
** Position Summary
** The Application Security and Authorization Manager is responsible for overseeing the security of enterprise applications and access management across the enterprise. This role ensures that business applications used by Constellation Brands are protected against threats and access to them is managed according to firm policy, industry best practices, and compliance requirements.

This role will oversee regular application security assessments, identity and access management (IAM), and authorization frameworks. This role will require collaborate with applications owners; enterprise architects; and infrastructure, security, and compliance teams to ensure strong digital protections and threat mitigation around enterprise applications. They will be responsible for ensuring that security measures will meet firm standards and relevant regulations.

The ideal candidate is a technically capable, process-driven, collaborative leader with strong expertise in application security, IAM, and regulatory compliance. They possess excellent organizational skills, a strategic mindset, and an ability to work across teams to ensure effective responses to any potential threats to enterprise applications. Success in this role requires a commitment to governance, continuous improvement, and enabling business agility.
** Key Responsibilities**
* ** Policy & Compliance Management:
** Develop, implement, and enforce robust application security policies, standards, and procedures. Ensure continuous compliance with internal controls and external regulations such as SOX, GDPR, etc..
* ** Role-Based Access Control (RBAC) & SoD:
** Design, manage, and maintain effective Role-Based Access Controls (RBAC) and Segregation of Duties (SoD) frameworks to prevent conflicts of interest and unauthorized access across all systems.
* ** SAP Security Expertise:
** Oversee all aspects of SAP security, including role design, user administration in various SAP systems (S/4

HANA, Fiori, TM, BTP), and management of SAP GRC (Governance, Risk, and Compliance) solutions for automated risk analysis and reporting.
* ** Enterprise Systems Oversight:
** Manage core non-SAP platforms Integrations with IAM (e.g., Azure AD or Entra, Okta, SailPoint and any application specific tooling), ensuring seamless user lifecycle management (joiners, movers, leavers) and integration with various cloud based SAAS services and systems.
* ** Operational Excellence & Process Improvement:
** Champion the continuous improvement of security operations by optimizing existing processes, standardizing procedures, leveraging automation technologies, and reducing manual effort within the security and provisioning life cycles.
* ** Access Monitoring & Incident Response:
** Monitor system access logs, review exception reports, and investigate potential authorization misuse or breaches. Lead rapid response efforts to contain, analyze, and remediate application security incidents specifically related to user roles, permissions, and compromised…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary