Identity Access Management (Iam) Cybersecurity Manager
![]() | |
![]() United States, Nebraska, Lincoln | |
![]() | |
Leads teams through the overall enterprise security architecture, integration, implementation and delivery of system security changes and is the central point of communication, maintaining a common vision, plan, and goal across all areas of accountability. Addresses risks that may arise during cybersecurity and identity and access life cycle management and digital identity transformation. Monitors the channels through which information flows into and out of the organization's information network. Keeps abreast of the latest technology, threats facing the organization, the state of the organizations security posture, as well as support change. Addresses the compliance requirements by ensuring the appropriate policies that support regulations are in place and enforced. This is a managerial position relating to operational, technical and administrative duties, with responsibility for the direct supervision of staff involved in the planning, deployment, administration and support of technology systems. Collaborates with leaders to streamline, optimize and prioritize technology and related security process workflows to meet the strategic goals of the organization. PRINCIPAL JOB FUNCTIONS: 1. *Commits to the mission, vision, beliefs and consistently demonstrates our core values. 2. *Responsible for managing the scope, cost, schedule and quality of identity access and cybersecurity initiatives. 3. *Manages human and technical security resource allocations to meet project deadlines. 4. *Responsible for recruiting, hiring, onboarding, developing and performing corrective action for assigned teams. 5. Monitors compliance with policies, regulations and customer requirements. 6. Collaborates with other departments to ensure secure access to systems and data. 7. Leads team to administer user accounts, permissions and access controls. 8. Monitors activity logs to identify security incidents. 9. Stays up to date with the latest industry developments and trends. 10. Responds to audit findings and implements remediation measures. 11. Handles escalated customer inquiries and support tickets. 12. *Creates and maintains a teamwork environment conducive to productivity, successful staff advancement and a rewarding work experience. 13. *Creates and distributes reports to demonstrate the effectiveness of the IAM Cybersecurity program; including, but not limited to, an annual report (to access and communicate the effectiveness of the IAM Cybersecurity program and make recommendations for improvements), quarterly report (on security incidents), and monthly report (on IAM Cybersecurity program metrics). 14. *Develops, plans and implements cybersecurity education and awareness training through a variety of methods (documents, videos, communications, campaigns, in-person trainings) to both technical and non-technical audiences. 15. Develops and manages IAM Cybersecurity Risk Analysis budget including operating expenses and capital project expenses. 16. Documents information on IT security assaults, threats, risks and controls. 17. Compares the efficacy of the incident response strategy to recommended practices in the industry. 18. Tests incident response plans frequently to verify reaction times and completed processes are satisfactory. 19. Works closely with the project leadership and other project managers to coordinate security activities. 20. Enters restricted areas without supervision to perform assigned work. 21. Maintains professional growth and development through seminars, workshops, and professional affiliations to keep abreast of latest trends in field of expertise. 22. Participates in meetings, committees and department projects as assigned. 23. Performs other related projects and duties as assigned. (Essential Job functions are marked with an asterisk "*". Refer to the Job Description Guide for the definition of essential and non-essential job functions.) Attach Addendum for positions with slightly different roles or work-specific differences as needed. REQUIRED KNOWLEDGE, SKILLS AND ABILITIES: 1. Knowledge of operations, workflow and processes related to specific area of technical support. 2. Knowledge of computer hardware equipment and software applications relevant to work functions, especially with a focus on integration of applications, medical devices, and peripherals with Epic. 3. Knowledge of the health care industry from the practice management perspective as well as from the health care delivery perspective. 4. Knowledge of identity and access management concepts, such as SSO, role-based access control, and identity federation. 5. Knowledge with networking firewalls, VPNs, and DNS. 6. Ability to manage, direct and evaluate employee performance. 7. Ability to lead teams, mentor team members, and work as a team member. 8. Ability to lead technical design sessions in delivering enterprise scale and complex technical and integration solutions, as well as enhanced troubleshooting of technical issues, especially related to an Epic environment. 9. Ability to communicate effectively both verbally and in writing. 10. Ability to effectively interact with clients having a broad range of computer knowledge and ability. 11. Ability to organize, prioritize and implement work assignments. 12. Ability to adapt to and effectively perform work functions in emergency and high stress situations. 13. Ability to plan for and act on changes in the business and market environment that impact current business plans and processes. 14. Ability to participate in the evaluation and design of computer systems and peripherals and the integration with various systems. 15. Ability to perform crucial conversations with desired outcomes. 16. Ability to problem solve and engage independent critical thinking skills. 17. Ability to maintain confidentiality relevant to sensitive information. 18. Ability to maintain regular and punctual attendance. EDUCATION AND EXPERIENCE: Bachelor's Degree in Computer Science, Business Administration/Management or an equivalent combination of management and technical experience and education necessary to gain the knowledge needed to manage technical personnel and systems required. Master's Degree in related subject preferred. Minimum of two (2) years of experience in a management role required. Previous experience with identity access management and cybersecurity required. Minimum of five (5) years of experience in the analysis, design, implementation, support and maintenance of computer systems required. Experience in leading multidisciplinary teams required. OTHER CREDENTIALS / CERTIFICATIONS: Must have internet connectivity off-premises in order to respond to work requests when necessary. Professional certification such as Certified Identity and Access Manager (CIAM), Certified Identity Management Professional (CIMP), COMPTIA Security+ Certification, Systems Security Certified Practitioner (SSCP), Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) required. PHYSICAL REQUIREMENTS: (Physical Requirements are based on federal criteria and assigned by Human Resources upon review of the Principal Job Functions.) (DOT) - Characterized as sedentary work requiring exertion up to 10 pounds of force occasionally and/or a negligible amount of force frequently to lift, carry, push, pull, or otherwise move objects, including the human body. |