×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Advisor - Identity Access Management

Job in Richmond, Henrico County, Virginia, 23214, USA
Listing for: Elevance Health
Part Time position
Listed on 2026-02-14
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Information Security Advisor - Identity Access Management Location

This role requires associates to be in-office 1 - 2 days per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Alternate locations may be considered if candidates reside within a commuting distance from an office.

Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law.

The Information Security Advisor role focuses on supporting Periodic Access Certifications, ensuring the quality and compliance of identities, applications, and entitlements, while providing strategic support for IAM processes. Responsible for the delivery of strategic network security, access control, and secure transaction/messaging solutions. Ensures security solutions involving the use of technologies are well-conceived, designed, and implemented in compliance with enterprise standards.

How you will make an impact
  • Provides first-level engineering design functions.

  • Ensure that identity, application, and entitlement data utilized in periodic system access reviews meet our internal controls for completeness and accuracy, adhering to policy requirements.

  • Lead internal control transformation efforts and offer valuable feedback for process alignment and improvement.

  • Leads or plans implementations for access management and network security technologies.

  • Develops testing plans to ensure quality of implementation.

  • Leads the investigation and reporting of data security events and incidents.

  • Support the Periodic System Access Certifications in compliance with internal policy requirements and external standards like SOX, SOC1, SOC2, Hi-Trust, PCI-DSS, and statutory audits.

  • Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards, and technologies.

  • Advocate for best practices in Centralized Access Provisioning/Termination, Modern Authentication, Role-Based Access Control, and Periodic Access Certifications, enhancing IAM posture and customer delivery.

  • Represents major upgrades and business system replacements in change control.

  • Partner with internal and external IAM stakeholders to analyze and improve Identity Management System data points.

  • Maintain standard templates for audit process consistency and address data gaps with IT/business teams.

  • Oversees Enterprise mix of vendor services; may act as a key contact for setting vendor strategy.

  • Designs & engineers repetitive technical solutions based on business requirements and defined technology standards.

  • Monitor progress on projects and KPIs, providing timely reports to leadership and facilitating effective escalations with stakeholders.

  • Leads level 1 & 2 incident recoveries and may organize the efforts of other analysts as part of incident recovery;
    Leads root cause analysis efforts.

  • Regularly participate in Agile ceremonies to facilitate project alignments.

  • Provide on-the-job training to peers for new processes or tools.

  • Articulate a clear vision for supporting organizational security and compliance, inspiring high standards and continuous improvement across the team.

Must be capable of providing top-tier support for 4 or more of the information security technology common body of knowledge skill sets

Access Control, Application Security, Business Continuity & Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal / Regulations, Compliance & Investigations, Operations Security, Physical (Environmental) Security, Security Architecture & Design, Telecommunications & Network Security

Minimum Requirements
  • Requires BS/BA degree in Information Technology or related field of study and a minimum of 5 years experience in systems support, system administration, system engineering, system security, access management, network security, network…

Position Requirements
5+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary