×
Register Here to Apply for Jobs or Post Jobs. X

IAM DIRECTOR

Job in Seattle, King County, Washington, 98127, USA
Listing for: FHLB Des Moines
Full Time position
Listed on 2026-02-23
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, IT Project Manager, Systems Engineer
Salary/Wage Range or Industry Benchmark: 130000 - 160000 USD Yearly USD 130000.00 160000.00 YEAR
Job Description & How to Apply Below
* Develop and lead the University’s IAM strategy to modernize and strengthen identity and access practices, ensuring it aligns with business goals, security requirements, and emerging technologies.
* Facilitate the development and execution of strategic roadmaps and distributed IAM architecture to support critical services, updating priorities, and identifying resource requirements.
* Participate in groups and committees to represent IAM both as an enterprise shared service and critical partner for other enterprise initiatives, projects, and business stakeholders.
* Act as an expert resource for engineers and analysts working on complex technical issues spanning all information technologies for the university.
* Embed Zero Trust principles into the University’s IAM strategy, ensuring continuous verification of users and devices.
* Oversee the architecture and deployment of scalable, secure, and flexible identity solutions that support cloud, on-premises, and hybrid environments, and ensure that identity and access management tools and practices are aligned with overall security architecture.
* Lead initiatives to integrate security-by-design principles into identity systems and processes, ensuring that security is considered at every stage of development.
* Collaborate with cross-functional teams to integrate identity and access management (IAM) systems with other cybersecurity and business systems to enhance user experience and security.
* Conduct reporting to ensure visibility for leadership, institutional affiliates, stakeholders, and customers. Regularly review and evaluate data to provide awareness, analysis, planning, set service expectations, and improve performance.
* Lead the end-to-end management of the IAM program, including identity lifecycle management, authentication, authorization, and access control mechanisms.
* Ensure effective identity governance through role-based access controls (RBAC), least privilege principles, and just-in-time (JIT) access strategies.
* Manage and optimize the University’s IAM tools and platforms, such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Identity Governance and Administration (IGA).
* Implement, manage and optimize the Privileged Access Management (PAM) solutions to control, monitor, and audit access to sensitive systems by privileged users.
* Develop, implement, and enforce access management policies, standards, and procedures to ensure secure and compliant access to systems, applications, and data.
* Ensure compliance with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI-DSS, SOX) related to identity management and data access.
* Lead periodic audits of access controls and identity management processes, ensuring adherence to internal policies and external regulations.
* Lead the development and implementation of automated user provisioning and de-provisioning processes to manage user identities and access across all systems.
* Ensure that identity governance policies are in place for monitoring and controlling user entitlements and certifications.
* Drive the adoption of self-service access request and management tools to enhance user efficiency and reduce administrative overhead.
* Ensure that identity and access management solutions are designed with user experience in mind, balancing security and ease of use.
* Lead training and awareness efforts to ensure that employees understand and comply with access management policies and best practices.
* Collaborate with the security operations team to monitor and detect identity-based threats, such as credential theft, account takeovers, and insider threats.
* Oversee the implementation of identity analytics and behavior monitoring tools to detect anomalous access patterns and potential threats in real time.
* Drive incident response efforts related to identity breaches and unauthorized access, ensuring rapid containment and remediation.
* Manage relationships with IAM solution providers, ensuring that third-party tools and services are aligned with University security and performance requirements.
* Conduct due diligence on…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary