Identity Access Management; Iam Cybersecurity Manager
Job in
Lincoln, Lancaster County, Nebraska, 68511, USA
Listing for:
Bryan Health
Full Time
position
Listed on 2026-01-03
Job specializations:
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly
USD
80000.00
100000.00
YEAR
Job Description & How to Apply Below
Position: Identity Access Management (Iam) Cybersecurity Manager
General Summary
Leads teams through the overall enterprise security architecture, integration, implementation and delivery of system security changes and is the central point of communication, maintaining a common vision, plan, and goal across all areas of accountability. Addresses risks that may arise during cybersecurity and identity and access life cycle management and digital identity transformation. Monitors the channels through which information flows into and out of the organization’s information network.
Keeps abreast of the latest technology, threats facing the organization, the state of the organization’s security posture, as well as support change. Addresses the compliance requirements by ensuring the appropriate policies that support regulations are in place and enforced.
This is a managerial position relating to operational, technical and administrative duties, with responsibility for the direct supervision of staff involved in the planning, deployment, administration and support of technology systems. Collaborates with leaders to streamline, optimize and prioritize technology and related security process workflows to meet the strategic goals of the organization.
Principal Job Functions
Commits to the mission, vision, beliefs and consistently demonstrates our core values.Responsible for managing the scope, cost, schedule and quality of identity access and cybersecurity initiatives.Manages human and technical security resource allocations to meet project deadlines.Responsible for recruiting, hiring, onboarding, developing and performing corrective action for assigned teams.Monitors compliance with policies, regulations and customer requirements.Collaborates with other departments to ensure secure access to systems and data.Leads team to administer user accounts, permissions and access controls.Monitors activity logs to identify security incidents.Stays up to date with the latest industry developments and trends.Responds to audit findings and implements remediation measures.Handles escalated customer inquiries and support tickets.Creates and maintains a teamwork environment conducive to productivity, successful staff advancement and a rewarding work experience.Creates and distributes reports to demonstrate the effectiveness of the IAM Cybersecurity program; including, but not limited to, an annual report (to access and communicate the effectiveness of the IAM Cybersecurity program and make recommendations for improvements), quarterly report (on security incidents), and monthly report (on IAM Cybersecurity program metrics).Develops, plans and implements cybersecurity education and awareness training through a variety of methods (documents, videos, communications, campaigns, in-person trainings) to both technical and non-technical audiences.Develops and manages IAM Cybersecurity Risk Analysis budget including operating expenses and capital project expenses.Documents information on IT security assaults, threats, risks and controls.Compares the efficacy of the incident response strategy to recommended practices in the industry.Tests incident response plans frequently to verify reaction times and completed processes are satisfactory.Works closely with the project leadership and other project managers to coordinate security activities.Enters restricted areas without supervision to perform assigned work.Maintains professional growth and development through seminars, workshops, and professional affiliations to keep abreast of latest trends in field of expertise.Participates in meetings, committees and department projects as assigned.Performs other related projects and duties as assigned.(Essential Job functions are marked with an asterisk "*").
Required Knowledge,
Skills and AbilitiesKnowledge of operations, workflow and processes related to specific area of technical support.Knowledge of computer hardware equipment and software applications relevant to work functions, especially with a focus on integration of applications, medical devices, and peripherals with Epic.Knowledge of the health care industry from the practice management perspective as well as from the health care delivery…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here: