1+ months

Cybersecurity Manager - IAM: Data and Directory Services

Austin, TX 78701
Apply Now
Apply on the Company Site
\u003Cdiv data-field=\u0022Position_Description\u0022 class=\u0022Summary\u0022\u003E\u003Cstrong\u003EPOSITION PURPOSE\u003C/strong\u003E\u003Cbr /\u003E\u003Cp\u003EAt The Home Depot, our Cybersecurity team plays a pivotal role in creating and implementing solutions to protect our associates, customers, and communities from internal and external security threats.\u003Cbr /\u003E \u003Cbr /\u003E Leads a\u0026nbsp;team of highly motivated architects/engineers who innovate, build, and deliver cyber solutions for the world\u0027s largest home improvement retailer. As a member of the Cybersecurity Identity and Access Management group, this person partners closely with other members from Cybersecurity and Application System Owners to design and implement a centralized identity data warehouse, authoritative source management and global identity view solutions across The Home Depot enterprise.\u003Cbr /\u003E \u003C/p\u003E\u003Cp\u003ELet\u0026rsquo;s protect the future of retail together.\u003Cbr /\u003E \u003C/p\u003E\u003Cstrong\u003EMAJOR TASKS, RESPONSIBILITIES AND KEY ACCOUNTABILITIES\u003C/strong\u003E\u003Cbr /\u003E\u003Cul\u003E\u003Cli\u003E30% - Strategy \u0026 Planning:Looks across teams with a focus on alignment and dependencies Gains a thorough understanding of infrastructure needs and guides teams to design infrastructure platforms that meet end user requirements Translates product and project goals into infrastructure strategy and clearly communicates direction and priorities to teams and business partners Determines value to the business of anticipated Systems Engineering efforts Identifies goals, metrics, and appropriate analytics to measure the performance of Systems Engineering teams; continually makes recommendations and refinements on approaches based on learnings Reviews recommended solutions and work of Systems Engineers to ensure alignment with company, stakeholder, and end user priorities\u003C/li\u003E\u003Cli\u003E20% - Delivery \u0026 Execution: Leads configuration, debugging, and support for infrastructure Documents, reviews and ensures that all quality and change control standards are met Leads field and corporate roll-outs of technology Leads the stand up of necessary system software, hardware, and equipment (physical or virtual) to meet changing infrastructure needs Creates and optimizes specifications for complex technology solutions Provides regular status to leadership regarding progress of Systems Engineering efforts Manages vendor relationships Manages, reviews, and approves purchase requests for hardware and software\u0026nbsp;\u003C/li\u003E\u003Cli\u003E20% - Support \u0026 Enablement: Removes roadblocks and obstacles that may impair Systems Engineers to help ensure efforts meet strategic, financial, and technical goals Receives and prioritizes escalations and incoming requests from product teams and stakeholders Guides the production of in-house documentation around solutions Monitors tools and proactively helps teams struggling with systems issues\u003C/li\u003E\u003Cli\u003E30% - People: Provides leadership, mentoring, and coaching to Systems Engineering professionals Attracts, retains, and develops top talent Conducts annual and mid-year reviews, reviewing individual development plans and providing performance feedback Fosters collaboration with team members to drive value, and identify and resolve impediments Advocates for the end user and stakeholder by becoming associated with the product, empathizing with and understanding user needs Guides more junior team members in strategy, alignment, analysis, and execution tasks Participates in and contributes to learning activities around systems engineering core practices (communities of practice)\u003C/li\u003E\u003C/ul\u003E\u003Cstrong\u003ENATURE AND SCOPE\u003C/strong\u003E\u003Cbr /\u003E Typically reports to the Systems Engineer Sr. Manager, Technology Director or Sr. Director.\u003Cbr /\u003E \u003Cstrong\u003EENVIRONMENTAL JOB REQUIREMENTS\u003C/strong\u003E\u003Cbr /\u003E \u003Cstrong\u003EEnvironment: \u003C/strong\u003E\u003Cbr /\u003E Located in a comfortable indoor area. Any unpleasant conditions would be infrequent and not objectionable.\u003Cbr /\u003E \u003Cstrong\u003ETravel: \u003C/strong\u003E\u003Cbr /\u003E Typically requires overnight travel 5% to 20% of the time.\u003Cbr /\u003E \u003Cstrong\u003E\u003C/strong\u003E\u003C/div\u003E\u003Cdiv data-field=\u0022Postion_Requirement\u0022 class=\u0022Requirement\u0022\u003E\u003Cstrong\u003EMINIMUM QUALIFICATIONS\u003C/strong\u003E\u003Cbr /\u003E Must be eighteen years of age or older.\u003Cbr /\u003E Must be legally permitted to work in the United States.\u003Cbr /\u003E \u003Cstrong\u003E\u003C/strong\u003E\u003Cbr /\u003E \u003Cstrong\u003EEducation Required:\u003C/strong\u003E\u003Cbr /\u003E The knowledge, skills and abilities typically acquired through the completion of a bachelor\u0027s degree program or equivalent degree in a field of study related to the job.\u003Cbr /\u003E \u003Cstrong\u003E\u003Cbr /\u003E Years of Relevant Work Experience: \u003C/strong\u003E5 years\u003Cbr /\u003E \u003Cstrong\u003EPhysical Requirements:\u003C/strong\u003E\u003Cbr /\u003E Most of the time is spent sitting in a comfortable position and there is frequent opportunity to move about. On rare occasions there may be a need to move or lift light articles.\u0026nbsp;\u003Cp\u003EThis role will provide the opportunity for the potential candidate to be part of a major transformation.\u0026nbsp; Leading a Cybersecurity team and work closely with a team of highly motivated architects/engineers who innovate, build, and deliver cyber solutions for the world\u0027s largest home improvement retailer. As a member of the Cybersecurity Identity and Access Management group, this person partners closely with other members from Cybersecurity, Audit, Human Resources and other Application\u003Cstrong\u003E \u003C/strong\u003ESystem Owners to design and implement a centralized identity data warehouse, authoritative source management and global identity view solutions across The Home Depot enterprise.\u003C/p\u003E\u003Cbr /\u003E\u003Cstrong\u003EPreferred qulaifications:\u003C/strong\u003E\u003Cbr /\u003E\u003Cul\u003E\u003Cli\u003EBachelor\u0026rsquo;s Degree in Computer Science or equivalent experience\u003C/li\u003E\u003Cli\u003E6-8\u002B years of experience in data modeling and data warehousing\u003C/li\u003E\u003Cli\u003E6-8\u002B years of experience in IAM domain\u003C/li\u003E\u003Cli\u003E5\u002B years of experience in Active Directory/LDAP Directory, and Azure AD management, design, and architecture\u003C/li\u003E\u003Cli\u003EExpertise in data model design, implementation, and administration for different data storage technology - RDBMS, NoSQL, Big Data, GCP BigQuery\u003C/li\u003E\u003Cli\u003EExperience and knowledge in Virtual Directory Service\u003C/li\u003E\u003Cli\u003EExperience and knowledge in ETL/ELT technology and practice\u003C/li\u003E\u003Cli\u003EExperience and knowledge in Data Analytic and visualization technology\u003C/li\u003E\u003Cli\u003EExperience and knowledge in data access/service APIs \u0026ndash; REST, Web Services, SCIM, etc.\u003C/li\u003E\u003Cli\u003EExtensive knowledge of Microsoft Enhanced Security Administrative Environment (ESAE)\u003C/li\u003E\u003Cli\u003EStrong Technical proficiency in PowerShell scripting for Active Directory management\u003C/li\u003E\u003Cli\u003EStrong Technical proficiency in Group Policy Object (GPO) management, Domains, Trusts, Sites, and Services\u003C/li\u003E\u003Cli\u003EActive Directory Public Key Infrastructure (PKI) and Domain Name System (DNS) experience\u003C/li\u003E\u003Cli\u003EExperience with Active Directory Management Tools\u003C/li\u003E\u003Cli\u003ECloud security operations experience and cloud orchestration operations\u003C/li\u003E\u003Cli\u003EStrong technical competence up and down the technology stack - user interface, applications, communications, infrastructure, database, network, storage, etc\u003C/li\u003E\u003Cli\u003EStrong desire and aptitude for continuous learning and keeping abreast of new and emerging technology and cyber threats/vulnerabilities\u003C/li\u003E\u003Cli\u003EGoogle Cloud (GCP)\u003C/li\u003E\u003Cli\u003EOracle LDAP ODSEE\u003C/li\u003E\u003Cli\u003EVirtual Directory Service (VDS)\u003C/li\u003E\u003Cli\u003ERadiant Logic\u003C/li\u003E\u003Cli\u003ESailPoint IIQ\u003C/li\u003E\u003Cli\u003EOIG (Oracle Identity Governance)\u003C/li\u003E\u003Cli\u003EWorkday\u003C/li\u003E\u003Cli\u003ETalend\u003C/li\u003E\u003C/ul\u003E\u003Cp\u003E\u003Cstrong\u003EResponsibilities:\u003C/strong\u003E\u003C/p\u003E\u003Cul\u003E\u003Cli\u003EStrong Leadership and Management skills\u003C/li\u003E\u003Cli\u003EChange Agent - Passionate about making an impact with a lasting change. Adapt to change quickly and adjust work accordingly in an extremely positive manner\u003C/li\u003E\u003Cli\u003EDriven and result oriented\u003C/li\u003E\u003Cli\u003ECapture what, where and how IAM data and data subjects are currently generated, transferred, stored, secured, and accessed/consumed\u003C/li\u003E\u003Cli\u003EDefine and perform IAM domain Master Data Management\u003C/li\u003E\u003Cli\u003EDefine and design data and metadata that are to be enriched and consumed\u003C/li\u003E\u003Cli\u003EDesign \u0026 implement IAM data model to identify and capture data subjects and relationships\u003C/li\u003E\u003Cli\u003EDefine strategies and design of IAM data warehouse, data mart, and data lake\u003C/li\u003E\u003Cli\u003EDesign and define data storage technology and platform \u0026ndash; Directories, Relational Databases, NoSQL Databases (Key/Value, Column, Graph, and Document), Big Data and Unstructured Data\u003C/li\u003E\u003Cli\u003EDefine and design data analytic and data visualization technology\u003C/li\u003E\u003Cli\u003EDesign Data Service guidelines to separate data access services from underlying data storage technology and ensure access and governance security\u003C/li\u003E\u003Cli\u003EDefine data service technology in line with industry trend and compliance\u003C/li\u003E\u003Cli\u003EOversee corporate IAM data governance, auditing, and access monitoring\u003C/li\u003E\u003Cli\u003EManage ETL/ELT technology and implementation best practice for the IAM domain\u003C/li\u003E\u003Cli\u003EManage data virtualization architecture, design, and implementation\u003C/li\u003E\u003Cli\u003EDevelop data model design to support policies and rules engine\u003C/li\u003E\u003Cli\u003EOwn, operate and drive AD/AD Azure/LDAP Directory/Virtual Directory operations and auditing\u003C/li\u003E\u003Cli\u003ECoordinate defense in depth protections with 3rd party providers for threat intelligence, threat analysis, and threat remediation\u003C/li\u003E\u003Cli\u003ERespond to threats in real-time, through diagnosis, communication, and remediation\u003C/li\u003E\u003Cli\u003EProvide input and recommendations on cybersecurity policy, risk, and overall security best practices\u003C/li\u003E\u003Cli\u003EInteract with, influence, and negotiate security requirements with internal and external parties\u003C/li\u003E\u003C/ul\u003E\u003Cbr /\u003E\u003Cbr /\u003E \u003Cstrong\u003E\u003C/strong\u003E\u003Cbr /\u003E \u003Cbr /\u003E \u003Cstrong\u003EKnowledge, Skills, Abilities and Competencies:\u003Cbr /\u003E \u003C/strong\u003EAttracts Top Talent: Attracting and selecting the best talent to meet current and future business needs \u003Cbr /\u003E Balances Stakeholders: Anticipating and balancing the needs of multiple stakeholders \u003Cbr /\u003E Builds Effective Teams: Building strong-identity teams that apply their diverse skills and perspectives to achieve common goals \u003Cbr /\u003E Business Insight: Applying knowledge of business and the marketplace to advance the organization s goals \u003Cbr /\u003E Collaborates: Building partnerships and working collaboratively with others to meet shared objectives \u003Cbr /\u003E Communicates Effectively: Developing and delivering multi-mode communications that convey a clear understanding of the unique needs of different audiences \u003Cbr /\u003E Develops Talent: Developing people to meet both their career goals and the organization s goals \u003Cbr /\u003E Drives Engagement: Creating a climate where people are motivated to do their best to help the organization achieve its objectives \u003Cbr /\u003E Drives Vision and Purpose: Painting a compelling picture of the vision and strategy that motivates others to action \u003Cbr /\u003E Manages Ambiguity: Operating effectively, even when things are not certain or the way forward is not clear \u003Cbr /\u003E Organizational Savvy: Maneuvering comfortably through complex policy, process, and people-related organizational dynamics \u003Cbr /\u003E Situational Adaptability: Adapting approach and demeanor in real time to match the shifting demands of different situations\u003C/div\u003E
Posted: 2020-06-13 Expires: 2020-11-09
Sponsored by:
ADP Logo

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cybersecurity Manager - IAM: Data and Directory Services

Home Depot
Austin, TX 78701

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast