At a Glance
- Tasks: Lead the IAM programme, ensuring secure user identity and access management.
- Company: Join a forward-thinking company focused on cybersecurity and innovative solutions.
- Benefits: Enjoy flexible working options, competitive salary, and professional development opportunities.
- Why this job: Be at the forefront of cybersecurity, making a real impact in a dynamic environment.
- Qualifications: 10+ years in IT/Security, with 5+ years in IAM management; relevant certifications preferred.
- Other info: Collaborate with cross-functional teams and manage outsourced teams in a virtual setting.
The predicted salary is between 72000 - 108000 £ per year.
Responsible for overseeing the IAM program, ensuring secure and efficient management of user identities as well as access to systems, applications, and data. This role involves developing, improving, and implementing IAM standards and procedures, managing user access, and providing direction and strategy for all IAM modalities. The Head of IAM will also be accountable for investigating incidents, recommending corrective actions, and training users on IAM standards and procedures.
What you will be doing:
- Develop and improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access.
- Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards.
- Identify gaps or potential improvements in the IAM landscape.
- Prepare responses to risk assessments and audits that identify and mitigate potential IAM risks.
- Participate in security IAM incident investigations and recommend corrective actions which include root cause and recommended actions.
- Prepare communication to users on IAM policies and procedures.
- Stay up to date on evolving threats, technologies, and solutions in the IAM space.
- Collaborate with other departments to ensure secure access to systems and data.
- Document IAM processes and procedures for reference and compliance purposes.
- Escalate and resolve IAM-related issues in a timely manner.
- Manage multi-factor authentication (MFA) systems to ensure they are functioning correctly and securely.
- Manage single sign-on (SSO) solutions to improve users experience and security.
- Monitor, maintain, and improve SSO systems to ensure they are functioning correctly and securely.
- Prepare monthly KPI and KRI metrics and reports for executive management.
- Create IAM presentations for an executive audience.
- Build business cases for any new capabilities or solutions needed.
- Collaborate with the Cybersecurity and solution architects to create and maintain the IAM strategy and roadmap.
What you will bring:
- Minimum of 10 years of experience in IT or Security, with at least 5 years in a management role overseeing IAM programs.
- Professional certification such as Certified Identity and Access Manager (CIAM) or Certified Identity Management Professional (CIMP), CISSP, or CISM is highly desirable.
- Experience with cybersecurity frameworks and standards, such as NIST, ISO 27001, or similar.
- General understanding of operational risk and risk-related control frameworks and practices such as ISO 27001, NIST SP 800-53, NIST CSF, COBIT, ITIL, etc.
- Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure Active Directory), SailPoint, or similar.
- Experience with CyberArk for user and service account privileged access management.
- Excellent analytical, problem-solving, presentation, and communication skills.
- Ability to work collaboratively with cross-functional teams and stakeholders in a highly matrixed organization.
- Experience with managing an outsourced team.
- The ability to prioritize multiple IAM initiatives using a risk-based approach.
- Good technical background in a range of security, and IAM technologies, specifically within an Azure environment.
- Experience migrating to a password-less environment.
- Excellent understanding of IAM principles, technologies, and best practices.
- Strong and broad understanding of Cybersecurity and IAM methodologies, frameworks and best practices.
- Understanding of project management methodologies.
- Knowledge of M365/Azure AD conditional access policies.
- Knowledge of Azure security principles and best practices.
- Bachelor's degree in computer science, information technology, or a related field.
- Excellent organizational skills.
- Ability to lead and work in a geographically dispersed virtual team environment.
- Excellent Power Point presentation documentation, verbal communication and interpersonal skills.
- Excellent stakeholder management skills and management of expectations.
- Proven experience in dealing/working with 3rd party suppliers.
Head of Identity & Access Management London, Agile employer: Enstar Group
Contact Detail:
Enstar Group Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Head of Identity & Access Management London, Agile
✨Tip Number 1
Network with professionals in the IAM field, especially those who have experience in leadership roles. Attend industry conferences or webinars to connect with potential colleagues and learn about the latest trends and challenges in IAM.
✨Tip Number 2
Familiarise yourself with the specific IAM tools and technologies mentioned in the job description, such as Microsoft Entra ID and CyberArk. Consider setting up a demo or trial account to gain hands-on experience, which can be a great talking point during interviews.
✨Tip Number 3
Stay updated on the latest cybersecurity threats and IAM best practices by following relevant blogs, podcasts, and forums. This knowledge will not only help you in interviews but also demonstrate your commitment to continuous learning in the field.
✨Tip Number 4
Prepare to discuss your experience with risk assessments and audits in detail. Be ready to share specific examples of how you've identified and mitigated IAM risks in previous roles, as this is a key responsibility for the Head of IAM position.
We think you need these skills to ace Head of Identity & Access Management London, Agile
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in Identity and Access Management (IAM) and cybersecurity. Focus on your management roles and any specific IAM tools or frameworks you've worked with, such as Microsoft Entra ID or CyberArk.
Craft a Compelling Cover Letter: In your cover letter, emphasise your leadership experience and how it aligns with the responsibilities of the Head of IAM role. Mention specific achievements in improving IAM standards or managing user access that demonstrate your capability.
Showcase Relevant Certifications: List any professional certifications you hold, such as CIAM, CIMP, CISSP, or CISM, prominently in your application. These credentials are highly desirable for this position and can set you apart from other candidates.
Highlight Collaboration Skills: Since the role requires collaboration with cross-functional teams, provide examples in your application of how you've successfully worked with different departments to enhance IAM processes or resolve security issues.
How to prepare for a job interview at Enstar Group
✨Showcase Your IAM Expertise
Make sure to highlight your extensive experience in Identity and Access Management. Be prepared to discuss specific IAM tools you've used, such as Microsoft Entra ID or CyberArk, and how you've implemented them in previous roles.
✨Demonstrate Problem-Solving Skills
Prepare examples of how you've identified gaps in IAM processes and the corrective actions you recommended. This will show your analytical skills and ability to improve security measures effectively.
✨Communicate Clearly
Since this role involves preparing communications for users and executive presentations, practice articulating complex IAM concepts in a clear and concise manner. Use examples from your past experiences to illustrate your points.
✨Stay Updated on Trends
Be ready to discuss the latest trends and threats in the IAM space. Showing that you are proactive about staying informed will demonstrate your commitment to the role and the importance of cybersecurity.