General Information
Job Description | INFO SYS SUPV 2 | Working Title | Manager, Identity and Access Management |
---|---|---|---|
Job Code | 000530 | Grade | 25 |
Department Name | IT Cybersecurity - D02046 | Department Head | |
Supervisor | Effective Date | 11/09/2020 |
Position(s) Directly Supervised
Job Code | Title | FTE |
---|---|---|
007309 | INFO SYS ANL 3 | 1 |
000652 | APPLICATIONS PROGR 4 | 1 |
007300 | APPLICATIONS PROGR 3 | 1 |
Generic Scope
Provides direct supervision typically to professionals or skilled technical employees. Functions as advisor to unit and administration. Analyzes and resolves problems, interprets policies (e.g., fiscal management, HR, contracts and grants, resource management in defined areas) and demonstrates solid subject matter knowledge. Exercises judgment within defined procedures and policies to determine appropriate action. Supervises staff to assure accountability and stewardship of department resources (operational, financial, and human) in compliance with departmental goals and objectives. |
Custom Scope
Receives assignments in the form of objectives with goals and the process by which to meet goals. Provides direction to staff according to established policies and management guidance. Administers policies that directly affect subordinate staff. Recommends changes to department policies and practices. Identifies risks and responds accordingly. Provide priority setting and work flow analysis. |
Department Custom Scope
The Manager of Identity and Access Management (IAM) reports directly to the Chief Information Security Officer and is responsible for leading the development, design and implementation of enterprise identity and access management (IAM) architectures and solutions related to authorization, authentication, identity registry management, and identity lifecycle in campus data repositories. In addition to leading the IAM team, the Manager of IAM will also lead cross functional teams made of both business functional and technical team members to create and manage IAM processes and procedures. |
Education & Experience Requirements
Education Requirements
Degree | Requirement |
---|---|
Bachelor's degree or equivalent work experience with an emphasis in computer science, data processing, computer information systems, or in a related field. | Required |
Advanced degree. | Preferred |
Experience Requirements
Experience | Requirement |
---|
License Requirements
Certification Requirements
Certification | Requirement |
---|
Educational Condition Requirements
Condition | Requirement |
---|
Key Responsibilities
Description | % Time |
---|---|
Participates in developing and monitoring operational and budget processes, staff FTE, finance, human resources and space planning.
|
15 |
Participates in the development and monitoring of information systems policies and procedures for department or department operations.
|
15 |
Recommends hiring of new employees, salary actions, terminations, and performance ratings. | 10 |
Helps analyze the needs of functional departments and helps to establish priorities for feasibility studies and systems design and implementation to develop new and/or modify information processing systems.
|
25 |
Coordinates activities of professional staff with functional departments involved in system requirements, techniques, and controls.
|
10 |
Leads the development, design and implementation of enterprise identity and access management (IAM) architectures and solutions related to authorization, authentication, identity registry management, and identity lifecycle in campus data repositories. | 25 |
Knowledge, Skills & Abilities
Knowledge/Skill/Ability | Requirement |
---|---|
In-depth knowledge of various areas of IT. Broad knowledge of the IT environment. Has solid knowledge of information systems function. | Required |
Knowledge necessary to design, set up, operate and correct malfunctions involving technology systems. | Required |
Advanced knowledge of computer security tools, best practices and policies including demonstrated experience securing server-based software. | Required |
Advanced knowledge of secure software development. Advanced knowledge of business and process analysis functions. | Required |
Knowledge of conceptual database design. | Required |
Knowledge of test application code in client server environment. | Required |
Has solid interpersonal and management skills. Demonstrated skill in managing technical staff. | Required |
Has solid knowledge of related principles and concepts to provide solutions to more complex and diverse information systems issues. Solid knowledge of the applications programming development function. | Required |
Requires solid ability to communicate highly technical information in a clear and concise manner to both technical and nontechnical personnel. | Required |
Solid ability to gather, organize, and analyze data in the completion of assignments. | Required |
Excellent oral and written communication skills. | Required |
Ability to think strategically and communicate effectively in a fast-moving, rapidly changing environment. | Required |
Demonstrated skill in managing technical staff. | Preferred |
Thorough knowledge of technical concepts and basic operating principles of data communications, computer hardware, vendor IT products, and software. | Required |
Familiarity with authentication and authorization technologies such as CAS, Shibboleth, ADFS, Active Directory, or LDAP. | Required |
Special Requirements & Conditions
Special Condition | Requirement |
---|---|
Must pass a background check. | Required |
Occasional travel for university related business meetings, conferences and/or professional development. | Required |
Other Special Requirements & Conditions
|
Level of Supervision Received
Direction |
Environment
Working Environment
UCPath IntelliCenter Building |
Other Requirements
Items Used
|
Physical Requirements
|
Mental Requirements
|
Environmental Requirements
|
Critical Position
Is Critical Position: No |