Cloud Identity Transformation Technical Manager
Job Closed
Overview
Required skills & experience (the 7 “must haves” to be considered) 1. Bachelor’s degree with a major course work in Information Technology, Computer Science, Cyber Security, or closely related field. 2. 5+ years’ experience in information security; strong application security expertise required. 3. 2+ years’ experience in a formal .NET application development role. 4. Working knowledge of common web application security vulnerabilities (OWASP Top Ten, SANS Top 25, etc.) and programming patterns that lead to them, as well as remediation techniques. 5. Experience with software security testing (static and dynamic analysis). 6. One current, professionally recognized certification in a security-related field required: For example OWASP, GSSP-.NET, CISSP. 7. Should have working knowledge and experience ensuring compliance with security frameworks such as ISO, PCI DSS, NIST, CIS and SANS Critical Controls. What you need to know - This is a full-time based in Dallas, TX - Relocation assistance is offered for the right candidate, but strong preference for local. Position summary This position is an integral member of the Cybersecurity Identity Management team as the Cloud Identity Transformation Technical Manager and will be responsible for leading the identity cloud transformation efforts in advancing cybersecurity program. You will work with business leadership, staff and key stakeholders and will provide planning and directing of projects and business operations to ensure the strategic business plans are successfully executed. You will develop short to long term IDM transformation strategies. You will lead the expansion of the IDM transformation framework and support processes to facilitate the efficient and timely execution of the program’s strategic initiatives. - Serve as a hands on subject matter expert in the field of application security. Work with developers, architects, project leads/managers, business analysts and others, in identifying security requirements for projects and ensures that these requirements are met as part of the software development lifecycle. - Develop and grow a risk-based Application Security program which meets regulatory requirements and aligns with industry leading information security practices. - Perform security design review, threat modeling and architectural/system security assessments to ensure that solutions are being designed with a minimal degree of technical risk. - Create advisory and strategy documents, conduct proof-of-concept evaluations, selection advice and recommendations, and determine optimal ways of integrating technology into new and existing processes. - Build and maintain strategic partnerships with all impacted business units. - Manage security solution lifecycle requirements, expansion, and redundancy planning.