Job was saved successfully.
Job was removed from Saved Jobs.

Job Details


Key Bank

Info Security Consultant

Law Enforcement and Security

Diplomatic Security

No

Various, Ohio, United States

Job Profile Summary The position is to handle operational, security, and administrative tasks performed by the CIS(Corporate Information Security) Identity and Access Management team and several examples of those operational tasks are the following: Provisioning user accounts based on least privilege model. Setup, process, and support access across various platforms, databases, server and applications. Incident response which includes 24x7 off hours support. Reporting and compliance functions. Cross organization and vendor collaboration activities. Project assignments. General Identity & Access Management (IAM) queries/research. The ideal candidate for this position has an in-depth knowledge of security and technology, with strong understanding of risk management. The candidate must be able to make decisions based on prior experience in a large enterprise environment and their solid understanding of the technologies and risks involved Job Description Required Qualifications:Minimum of two years of information security, technology, or IAM experienceBS/BA degree or equivalent work experience Subject matter expert level expertise knowledge of both the business and technical aspects of security and technology Project management and/or project team member experienceExcellent customer service and relationship management skillsExcellent interpersonal, facilitation, and negotiation skillsExcellent process management and organizational skillsExcellent written and verbal communication skillsProficiency running technology and/or security tools Ability to create and implement new processes and procedures Must be willing to work after-hours, overnights and weekends. On call rotation Essential Job Functions:Create, modify, and delete user and service accounts based on the model of least privilege access Provision and support access to many wide-ranging applications – both internal and external Trusted advisor to the line of businesses and technology organizations on projects that involve applications we administrate or new ones that we onboard Create and manage operation documentationConducts researchIncident response, triage, and resolutionEscalates problems in a timely mannerAnticipates and addresses security needs/issuesMaintains knowledge of application and security advancementsPerforms activities within established Service Level Agreements (SLA’s) Performs IAM operational tasks to ensure proper follow-up and response Complete clean up efforts of access identified by the Access Control audits Ability to lead from a non-leadership position and within a cross functional team