- Truist (Charlotte, NC)
- …performance indicators and metric reporting for IAM and PAM + Review control designs and effectiveness for compliance + Review existing standards against ... internal and external auditors as well as liaise with IAM and PAM control owners to ensure...Qualifications:** + Understand multiple approaches to regulatory compliance and control effectiveness design + 10 years experience… more
- Truist (Charlotte, NC)
- …**Preferred Qualifications:** + Understand multiple approaches to regulatory compliance and control effectiveness design + Deep understanding of SOX, GLBA, ... subject matter expertise in the areas of standing up process and controls around IAM Policy, standards,...+ 15 years' technical experience working in the GRC control function + 10 years' experience as a manager… more
- Wells Fargo (Charlotte, NC)
- …and business divisions at wellsfargojobs.com This role will report directly to the IAM Scope Director within the IAM Execution and Governance organization and ... protocols, and approaches with respect to risk mitigation and the control environment, including ensuring effective planning for sustainability, ongoing control… more
- Wells Fargo (Charlotte, NC)
- …Governance, CIO application teams). + Participate in and influence end-to-end key risk process development, control design and effectiveness evaluation, and ... diligence activities include control design assessment and gap identification, control effectiveness testing, issue management of corrective actions and… more
- USAA (Charlotte, NC)
- …application team to figure out how the applications adhere to the Enterprise IAM platforms and process . You will perform in-depth analysis on application's ... Security Advisor - Mid Level, you will be part of the USAA Workforce Identity and Access Management ( IAM ) Application Onboarding Team. You will work with numerous… more
- TIAA (Charlotte, NC)
- …Expert level knowledge of IAM concepts like SSO, Federation, Role Based Access Control (RBAC). + Possess an in-depth understanding of IAM protocols such as ... solutions with other security systems, such as identity and access management ( IAM ), authentication, authorization systems and lead the design of CIAM solutions… more