Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Head of Identity & Access Management

Job Title: Head of Identity & Access Management
Contract Type: Permanent
Location: London, London
Industry:
Salary: £95000 - £115000 per annum + Package
Start Date: ASAP
REF: SFIAM6B_1409213731
Contact Name: John Winfield
Contact Email: johnw@montash.com
Job Published: about 3 years ago

Job Description

Montash are retained by a global Financial Services organisation with operations spanning 75 countries worldwide and revenues in excess of £25bn.

The organisation has been driving a centralisation journey across IT to move from a heavily federated operating model to one more strategically aligned by the group functions.

Under this centralisation the firm has built out three Security Operations Centres spanning the US, Europe and Asia to drive 24/7 monitoring of the enterprise.

The position in question is the the Global Head of Identity & Access Management to work closely with the Global Head of SOC to create a single IAM platform across the group.

At present the organisation has multiple disparate IAM clusters operating different tool sets, different policies and procedures and ultimately under the new central focus this is not fit for purpose.

Key Skills:

  • Demonstrable Leadership experience (10+ FTE)
  • Proven ability to drive multimillion £ change programmes in a global environment
  • The ability to leverage a technical understanding of an IAM infrastructure, preferably having come from IAM engineering/architecture background
  • Proven Vendor Management experience
  • Executive reporting experience and the ability to set and drive measured deliverables within a global IAM function
  • Significant budget management experience
  • Experience working in a global environment

Education & Qualifications:

  • MSc Information Security (preferred)
  • BSc Computer Science
  • CISSP
  • Strong understanding of IAM Tools (IBM Tivoli, Oracle IDM, Dell Quest tbc)

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...