Position Status: Administrative Non-Exempt Positions
Basic Function: The Identity and Access Management (IAM) Architect will serve as strategic thought leader and technical expert to design & implement IAM services and solutions supporting the University. The architect will join our IAM team, and be responsible for next gen IAM initiatives, partnering with vendors and internal teams to develop the solution.
Reporting to the IAM Program Manager, the successful candidate will design, build and oversee the implementation of computer security as it pertains to IAM for the University as well as be responsible for safeguarding information assets by identifying and solving potential and actual problems, creating complex security structures and ensuring their success.
Principal Duties and Responsibilities
• Acquire a complete understanding of the University’s technology and information systems • Work in conjunction with established technical teams to research, plan, and design a robust, ‘best in class’ Identity and Access Management (IAM) architecture that aligns and integrates with other Enterprise level IT efforts • Related privileged access solution. Creation of GUID and Identity Access data store and Identity Governance and Management solution • Work collaboratively to develop IAM and security requirements for Enterprise level networking • Research, define, implement and maintain corporate security procedures, including role-based authorization methodologies and protocols, authentication technologies, risk assessment procedures and security attack pathologies • Co-lead the IAM vendor selection process, including the evaluation of existing and emerging technologies and tools, as well as SI partners • Design public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures • Perform IAM vulnerability testing, risk analyses and security assessments • Review and in conjunction with other technical teams to integrate firewall, IDS scanning technologies and servers, router, switch and VLAN security; wireless security • Security concepts related to DNS, routing, authentication, VPN, proxy services and DDoS mitigation technologies • Provide technical supervision for (and guidance to) technical contributors
• Proven experience in evaluation and development of a robust IAM solution • 5 to 7 years of experience in information technology with 3-5 years in security • Knowledge of cloud risk assessment methodologies • Understanding of advanced security protocols and standards • Solid knowledge of information security principles and practices • Experience with security practices of Intranet and Extranet • Strong communications skills, both written and oral, and ability to convey technical information to the business community (ie. Identity flow diagrams) • Organized, responsive and highly thorough problem solver
Technical Knowledge: *NIX/LDAP, Active Directory, Access Control, ESM, IDS encryption, Digital Certificates, web security architecture
Certifications in one or more of the following: • CISSP, CISSP-ISSAP, CISM, CSSA, GSEC
Posting Date: 06/19/2017
Open Until Filled: Yes
Special Instructions to Applicants:
EEO Information: We are an Equal Opportunity Employer and do not discriminate against applicants due to race, color, age, religion, sex, sexual orientation, gender identity, national origin, veteran status or disability. We are looking for individuals who value creativity, diversity, inclusion, and collaboration.
Criminal Background Check Statement: A pre-employment criminal records check is required.
WPI, the nation's third oldest private technological university, established in 1865 by New England industrialists John Boynton and Ichabod Washburn consists of 80 acres set in a safe, residential section of Worcester, Massachusetts—the second largest city in New England—home to 13 colleges, and situated 40 miles west of Boston.