Job Description
This is a Hybrid work environment with 3 days in office.
Compelling opportunity for an experienced and talented leader to own Western Digital’s IAM (Identity and Access Management) program within the company’s Information Security organization, reporting directly to the CISO (Chief Information Security Officer).
The many layers of technologies and services under the IAM umbrella are foundational for all human and non-human interactions with company systems, applications, and data. IAM is also at the core of an effective information security program.
While this is not intended to be a hands-on-keyboard role, the right candidate will have a strong technical background in all areas of IAM and Information Security, especially across the relevant Microsoft suite of products and services. That knowledge and experience will be leveraged to skillfully lead the program and the team as a fully responsible owner. Equally important is the ability to effectively communicate in all forms to a broad variety of audiences across the enterprise.
Are you the right fit for this exciting, rewarding, and impactful leadership opportunity?
ESSENTIAL DUTIES AND RESPONSIBILITIES:
- Define and execute the vision and forward-thinking strategy for Western Digital’s IAM program, aligning it with business objectives and the company’s security requirements.
- Inspire, empower, and mentor a high-performing team of IAM professionals, fostering professional growth and skill development.
- Promote a collaborative team environment, recognizing and celebrating individual and collective achievements.
- Proactively engage with various stakeholders, including business units, IT, legal, compliance, audit, and external partners, to understand and address their IAM needs and expectations.
- With your team, develop and deliver a comprehensive and cohesive IAM architecture factoring in requirements from relevant organizations across the business.
- Establish and monitor key performance indicators and metrics for the IAM program, reporting on the effectiveness, efficiency, and maturity of the IAM processes and controls.
- Author and implement IAM policies, standards, and procedures, ensuring compliance with applicable laws, regulations, customer expectations, and security frameworks.
- Work collaboratively with cross-functional teams to ensure seamless integration of IAM strategies with other business processes.
- Effectively communicate IAM concepts and strategies to non-technical partners, fostering a shared understanding of security principles.
- Lead the evaluation and potential selection and implementation of emerging technologies and cutting-edge IAM solutions that may replace existing solutions or bring compelling new capabilities to the environment.
- Conduct regular IAM risk assessments and audits, identifying and remediating any gaps or issues in the IAM program.
Qualifications
REQUIRED:
- Proven experience (7+ years) in a strategic leadership role overseeing an IAM program in a large and complex enterprise environment which includes an emphasis on security.
- Demonstrated success in building and leading high-performing teams in dynamic environments.
- Exceptional communication and interpersonal skills with the ability to influence and collaborate with diverse stakeholders.
- Strong analytical, problem-solving, and decision-making skills, with the ability to manage complex and competing priorities.
- Strong project management and organizational skills, with the ability to deliver high-quality results within budget and on schedule.
- Extensive experience with on-prem and cloud-based Microsoft IAM products and services including directory services, all facets of user and device authentication and authorization, privileged access management, mobile device management, certificate management, identity federation, group management, single sign-on, etc.
- Extensive experience with industry leading IAM products and services including identity governance, privileged access management, multi-factor authentication, TLS certificate management, etc.
- Bachelor’s degree in computer science, information systems, cybersecurity, or related field, or equivalent work experience.