The Identity & Access Management (IAM) Architect will help lead the technical security vision and strategy for identity and perimeter security, and partner with leaders across the business to identify key risks and opportunities to enhance Workiva’s cloud security posture. In this capacity the role ensures that a large, multi-faceted IAM program is in place governing provisioning, access, single sign-on (SSO), directory services and technical integrations, as well as supporting behavioral analytics. Additionally, will work with multi-functional teams across infrastructure, information technology, and engineering to direct the design and development of security architectures to protect processes and data across endpoints, applications, and networks.
- Advise business and technical partners with expert knowledge of relevant security technologies.
- Design, develop, and maintain the technical architecture for Identity and Access Management across Workiva’s environment
- Influence security posture by evaluating business strategies and requirements
- Work with Information Security leadership to enhance security policies and procedures – especially as they pertain to identity governance, authentication standards, and authorization efficiencies
- Serve as InfoSec Ambassador and lead technical representative to Engineering, Information Technology, and the rest of the business for IAM topics.
- Lead initiatives designed to share knowledge across InfoSec, R&D, and Technology teams.
- Develop and execute strategies to increase Cloud Security knowledge throughout the enterprise.
What You’ll Need
- Undergraduate Degree or equivalent combination of education and experience in a related field.
- 8+ years of information security experience, including 2+ years directly related to identity governance
- Proven experience with leading corporate identity governance initiatives
- Experience developing security controls in a cloud-first and SaaS-heavy environment.
- Outstanding communication skills.
- Demonstrated capability to influence own team and beyond.
- Established a strong pattern of continuous education and personal development on information security topics
- Ability to connect security controls to improved business outcomes and influence business leaders.
- Familiarity with IAM controls required for key compliance and regulatory activities — ISO 27001, FedRAMP, etc.