×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity IAM Architect

Remote / Online - Candidates ideally in
Lincoln, Lancaster County, Nebraska, 68511, USA
Listing for: Banner Health
Full Time, Remote/Work from Home position
Listed on 2026-02-19
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Systems Analyst, Systems Engineer
Salary/Wage Range or Industry Benchmark: 57.38 - 95.64 USD Hourly USD 57.38 95.64 HOUR
Job Description & How to Apply Below

Estimated Pay Range
$57.38 - $95.64 / hour, based on location, education, & experience. In accordance with State Pay Transparency Rules.

Department Name
IT Identity Access Mgmt-Corp

Work Shift
Day

Job Category
Information Technology

Location
Remote (Arizona Time Zone). Eligible for remote work in the following states: AL, AK, AR, AZ, CA, CO, FL, GA, IA, , IN, KS, KY, LA, MD, MI, MN, MO, MS, NC, ND, NE, NH, NM, NV, NY, OH, OK, OR, PA, SC, TN, TX, UT, VA, WA, WI, WV & WY. Monday to Friday, 8am-5pm AZ.

Banner Health is seeking a Cybersecurity IAM Architect to lead the enterprise Cybersecurity IAM strategy, ecosystem, and architecture. The role involves developing architectural artifacts, models, patterns in alignment with industry standard frameworks such as SABSA, TOGAF, etc., and setting standards for identities and access in compliance with legal, regulatory, and Banner Health requirements. Responsibilities include lifecycle management of user accounts, IAM product rationalization and design, cloud identity, Azure Active Directory, AWS IAM, privileged access management, MFA, SSO, Zero Trust, and related capabilities.

Position Summary

This position is responsible for leading the enterprise Cybersecurity IAM strategy, ecosystem, and architecture for Banner Health. It includes development of architectural artifacts, models, patterns, and leading standards for identities and access. The role will design solutions to resolve complex technical and business issues related to Identity Governance and Administration (IGA), and drive IAM projects, strategic initiatives, budget, and goals.

Core Functions
  • Analyzes the business and IT environment, including Azure, Google Cloud platforms, and on-premises, to detect critical deficiencies from an IAM risk perspective, recommend solutions, and implement them. Performs IAM architecture validation against IT and Cybersecurity Policies and Standards, applicable regulations (HIPAA, PCI, GDPR, etc.). Participates in threat modelling exercises and architecture design assessments for identity‑related systems.
  • Creates and enforces IT Technical standards, IAM policies, standards, guidelines, best practices, and requirements. Develops, maintains, improves, and enforces architectural templates, processes, and documentation.
  • In collaboration with stakeholders, develops and maintains IGA current and future states, technical requirements, aligning them with business objectives.
  • Designs IAM solutions implementations in a rationalized, requirements‑aligned and systematic manner. Solution designs support Banner’s Zero Trust strategy and architecture.
  • Incorporates IAM governance concepts in all architectural designs to include segregation of duties, provisioning and de‑provisioning consistency and governance, user lifecycle workflows, authentication and authorization, master data authorities, federation, security controls, logging and monitoring, privileged access management, automation, zero‑trust concepts, and other considerations to keep IAM functions and solutions accounted for and secured.
  • Acts as trusted advisor by creating solution building blocks and reference architectures, providing guidance to cybersecurity engineers. Serves as mentor and maintains in‑depth knowledge of business strategies, initiatives, goals, industry trends, regulatory requirements, and cybersecurity threats.
  • Advises managers and engineering teams on investments in technologies or processes resulting from solution design, architecture development, cybersecurity risk assessments, identity architectural designs, and IGA risks.
  • Evaluates emerging/innovative IAM technologies for potential risks and opportunities, validates architectures for technical soundness. Develops relationships with business stakeholders and information technology management; excellent communicator.
Minimum Qualifications
  • Bachelor’s degree in business, information security, computer science, or related field.
  • 10+ years of experience in a healthcare environment or equivalent combination of education, technical, business, and healthcare experience, including one year in cybersecurity architecture at enterprise scale, preferably in healthcare.
  • Expertise…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary