The IAM Privileged Access Architect is responsible for designing, implementing, and managing security technology solutions on a global scale. This role focuses on the discovery, onboarding, storage, and management of privileged users, accounts, and resources for both human and non-human accounts.
What You'll Do:Technical design, implementation, enhancement and ongoing support for security technologies (40%)
AppSec reviews, penetration testing and other red teaming activities to identify gaps and weaknesses. Utilize red team learnings to improve detection capabilities and response automation (20%)
Process automation, orchestration for improving team efficiency, documentation and training (20%)
Executes and continually improves core security processes such as vulnerability management, threat analysis, security monitoring and incident response, identity and access management (10%)
Data analytics and KPI reporting for ensuring operational effectiveness and controls health (10%)
Bachelor's Degree with IT field of study preferred.
5+ Years of relevant work experience.
Substantial expertise in leveraging CyberArk as a primary tool to help secure TD Synnex's non-human accounts, particularly those that maintain high levels of privileged access.
Work with IAM Engineers and our supported business partners to capture business and functional requirements in primary efforts to define the scope of applications/privileged users to be onboarded into relevant PAM solutions.
Design and implement just-in-time privilege elevation, accessibility, application, and least privilege workflows using CyberArk, Microsoft PIM/PAM, and other similar technologies.
Monitor and regulate access to cloud entitlements and continuously identify and remediate security risks related to excessive privileges and policy violations.
Lead or contribute as a technical resource in multi-discipline IT security projects to enhance privileged access management infrastructure and procedures.
Advises IT development teams in integrating state-of-the art IAM process in their solutions, such as identity federation, single-sign-on, multifactor authentication, secured privileged access, role-based access controls, access revalidation etc.
Improve core processes in privileged access management, threat hunting and analysis, vulnerability management, security monitoring, and incident response for both on-premises and cloud environments.
Analyze and address suspicious user activity using AI and anomaly detection capabilities to make informed security decisions.
Provides technical documentation for solutions based on an understanding of the business or functional requirements and technical infrastructure
Working Conditions:
Occasional non-standard work hours or overtime as business requires.
On-call availability required as necessary.
Some travel required.
Knowledge, Skills and Experience:
Bachelor's Degree with IT field of study required.
5+ years' experience implementing/supporting enterprise-wide usage of PAM enforcement utilities like CyberArk, Microsoft PIM/PAM and similar tools.
Experience with cloud formation configuration management and deployment.
Experience supporting LDAP and Federation technologies such as Active Directory/ Federation/Cloud Tech such as Microsoft Identity Manager (MIM), MS Entra, AZURE, AD Connect, O365, MPPs, & RBAC
Develops code for IAM interfaces, connectors and workflows.
Able to converse and write effectively in English and local language.
Able to create and conduct formal presentations.
Able to interact effectively with all levels of management
Possesses strong multi-cultural interpersonal skills.
Possesses strong leadership skills with a willingness to lead, create new ideas, and be assertive.
Possesses strong organizational and time management skills, driving tasks to completion.
Able to constructively work under stress and pressure when faced with high workloads and deadlines.
Able to maintain and promote social, ethical, and organizational standards in conducting internal and external business activities.
Able to work independently with minimum supervision.
Able to maintain confidentiality of sensitive information.
Working Conditions:
Occasional non-standard work hours or overtime as business requires.
On-call availability required as necessary.
Remote Eligible position
Some travel may be required
Key Skills
CyberArk Privileged Access Management, Identity Federation, Identity Management Systems, Linux Security, Microsoft Defender, Microsoft Entra, Microsoft Identity Manager (MIM), Microsoft Intune, Ping Identity, Privileged Identity ManagementWhat's In It For You?
Don't meet every single requirement? Apply anyway.
At TD SYNNEX, we're proud to be recognized as a great place to work and a leader in the promotion and practice of diversity, equity and inclusion. If you're excited about working for our company and believe you're a good fit for this role, we encourage you to apply. You may be exactly the person we're looking for!
We are an equal opportunity employer and committed to building a team that represents and empowers a variety of backgrounds, perspectives, and skills. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, gender, gender identity or expression, sexual orientation, protected veteran status, disability, genetics, age, or any other characteristic protected by law.
TD SYNNEX is an E-Verify company