Job Description:
Role Summary/PurposeSynchrony Identity and Access Management (IAM) team is seeking an experienced and visionary IAM leader to head the IAM Authentication Technologies team. This individual will be responsible for guiding a team of IAM authentication technologies engineers in designing, developing, and implementing scalable, secure, and seamless solutions across the enterprise. The role requires a strong blend of technical expertise, leadership, and strategic vision to ensure our IAM ecosystem supports business needs, security requirements, and digital transformation initiatives.
OurWay of Working
We’re proud to offer you choice and flexibility. At Synchrony, our way of working allows you to have the option to work from home near one of our Hubs or come into one of our offices. Occasionally you may be required to commute to our nearest office for in person engagement activities such as business or team meetings, training and culture events.
EssentialResponsibilities
The ideal candidate for this role will embrace the exciting blend of technical expertise, program management, engagement ability and leadership that is required to be successful.
Product owner and thought leader that will own the workforce authentication strategy focused on security and user experience. Communicate and get buy-in on strategy to key stakeholder groups.
Lead teams focused on Synchrony’s authentications tools and services including Okta, Yubikey, FIDO2, WebAuthN, Passwordless, and RSA Authentication Manager.
Advance the SSO, Directory Services, and MFA vision by creating business cases that support, quantify, and prioritize product initiatives that deliver the highest value.
Enhance and maintain oversight to Synchrony’s authentication policies, standards, and risk metrics.
Maintain technical knowledge of Synchrony’s application authentication and authorization architecture.
Understand and implement leading authentication and authorization industry trends, proposing strategies to continually increase Synchrony’s authentication security and user experience.
Develop and maintain value driven business relationships through effective needs analysis, program management, customer service and problem resolution.
Champion authentication services by advising other business and technology teams on product capabilities.
Perform Information Security assessments, in conjunction with Sr. Application Security engineers, for key business applications (e.g. high franchise and high financial risk) to determine that the appropriate technical/process solutions are in place to protect assets.
Provide strategic risk guidance for business and technology projects, including the evaluation and recommendation of authentication controls
Identification of potential non-compliance issues, drive appropriate risk treatment, and drive remediation
Act as subject matter expert on Information Security topics during audit and/or regulatory meetings, business requirements reviews, and architecture reviews
Facilitate compliance to defined standards and develop tools to assist compliance
Perform other duties and/or special projects as assigned
Bachelor's degree in Technology, Risk Management, or equivalent work experience
Minimum 10 years in Information Technology, Risk Management, and/or Information Security
Building, installing, and maintaining security tools and platforms for Information Security
Analyzing log data in order to model cybersecurity threats and discover relevant patterns
Partnering with broader Information Security and operations groups to build tailored solutions for unique problems
Automating team and business processes where possible (through RPA or Python scripts)
Evaluating existing team processes and technologies and applying Dev Ops principles where possible
Collaborating with technology teams to implement FW rules and Proxy requests for application functionality
Implementing new technologies by building out new Virtual Machines, installing dependencies, application software, etc.
Proactively monitoring platform health and stability
Operating in a Linux or Windows command-line environment to maintain…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).