IAM DIRECTOR
Job in
Seattle, King County, Washington, 98127, USA
Listed on 2026-02-23
Listing for:
FHLB Des Moines
Full Time
position Listed on 2026-02-23
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant, IT Project Manager, Systems Engineer
Job Description & How to Apply Below
* Facilitate the development and execution of strategic roadmaps and distributed IAM architecture to support critical services, updating priorities, and identifying resource requirements.
* Participate in groups and committees to represent IAM both as an enterprise shared service and critical partner for other enterprise initiatives, projects, and business stakeholders.
* Act as an expert resource for engineers and analysts working on complex technical issues spanning all information technologies for the university.
* Embed Zero Trust principles into the University’s IAM strategy, ensuring continuous verification of users and devices.
* Oversee the architecture and deployment of scalable, secure, and flexible identity solutions that support cloud, on-premises, and hybrid environments, and ensure that identity and access management tools and practices are aligned with overall security architecture.
* Lead initiatives to integrate security-by-design principles into identity systems and processes, ensuring that security is considered at every stage of development.
* Collaborate with cross-functional teams to integrate identity and access management (IAM) systems with other cybersecurity and business systems to enhance user experience and security.
* Conduct reporting to ensure visibility for leadership, institutional affiliates, stakeholders, and customers. Regularly review and evaluate data to provide awareness, analysis, planning, set service expectations, and improve performance.
* Lead the end-to-end management of the IAM program, including identity lifecycle management, authentication, authorization, and access control mechanisms.
* Ensure effective identity governance through role-based access controls (RBAC), least privilege principles, and just-in-time (JIT) access strategies.
* Manage and optimize the University’s IAM tools and platforms, such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Identity Governance and Administration (IGA).
* Implement, manage and optimize the Privileged Access Management (PAM) solutions to control, monitor, and audit access to sensitive systems by privileged users.
* Develop, implement, and enforce access management policies, standards, and procedures to ensure secure and compliant access to systems, applications, and data.
* Ensure compliance with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS, SOX) related to identity management and data access.
* Lead periodic audits of access controls and identity management processes, ensuring adherence to internal policies and external regulations.
* Lead the development and implementation of automated user provisioning and de-provisioning processes to manage user identities and access across all systems.
* Ensure that identity governance policies are in place for monitoring and controlling user entitlements and certifications.
* Drive the adoption of self-service access request and management tools to enhance user efficiency and reduce administrative overhead.
* Ensure that identity and access management solutions are designed with user experience in mind, balancing security and ease of use.
* Lead training and awareness efforts to ensure that employees understand and comply with access management policies and best practices.
* Collaborate with the security operations team to monitor and detect identity-based threats, such as credential theft, account takeovers, and insider threats.
* Oversee the implementation of identity analytics and behavior monitoring tools to detect anomalous access patterns and potential threats in real time.
* Drive incident response efforts related to identity breaches and unauthorized access, ensuring rapid containment and remediation.
* Manage relationships with IAM solution providers, ensuring that third-party tools and services are aligned with University security and performance requirements.
* Conduct due diligence on…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×