The UCLA Information Security Office enables UCLA’s goals by providing leadership assuring the confidentiality, integrity, and availability of its information resources. The Information Security Office enables efficient incident response planning and notification procedures. In addition, the office aims to implement risk assessment strategies to identify vulnerabilities and threats to departmental information resources and enterprise systems. This includes executing a comprehensive UCLA IT security plan, which involves proposing, delivering, and enforcing administrative, technical, and physical security measures to tackle identified risks based on their sensitivity or criticality. The Identity and Access Management (IAM) team at UCLA is essential to safeguarding the university's digital assets and maintaining the security and privacy of students, faculty, and staff.
Position Summary
The Manager, Identity & Access Management (IAM) will focus on the operational aspects of managing digital identities and ensuring the appropriate access controls are enforced across UCLA's information systems. This role will involve the administration of university IDs and permissions for faculty, staff, and students, ensuring a secure digital environment for university community members. The Manager will oversee the user identity lifecycle including onboarding, offboarding, and account updates. Along with their team of analysts, the Manager will support current IAM technologies including Single Sign-On (SSO), access management technologies, and directory services. Additionally, they will collaborate with various departments to implement and maintain identity and access management solutions based on established best practices with other enterprise applications and services. They may support resolution of highly complex escalated issues or inquiries.
The Manager, Identity & Access Management will positively impact UCLA's operations and culture by protecting University stakeholders' information and data in service of the institution's academic mission. This team member will advance the University's mission by delivering exceptional security service comprehensively and consistently across faculty, staff, and students. This role will execute UCLA's vision while modeling UCLA's culture and values.
Salary & Compensation
*UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit UC Benefit package to discover benefits that start on day one, and UC Total Compensation Estimator to calculate the total compensation value with benefits.
Qualifications
- Five years experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Required)
- Two years experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Required)
- Experienced in managing and optimizing IAM operations to support organizational goals. (Required)
- Demonstrated experience presenting complex technical information to audiences of technical and non-technical stakeholders. (Required)
- Extensive experience solving technical and non-technical problems; able to delegate solutions. Able to lead data gathering efforts seeking information from diverse sources. (Required)
- Experience as a point of escalation, understanding how decisions affect teams, and the ability to make decisions with integrity. (Required)
- Demonstrated experience providing inclusive leadership of others, cultivating an inclusive environment that values equity, diversity, inclusion, and belonging. (Required)
- Has demonstrated experience leading in an ever-changing, fast-paced environment. (Required)
- Seven or more years experience working in one or more of the following fields: information technology, cybersecurity, computer science, management, higher education, or a related field. (Preferred)
- Five or more years experience leading teams in a management or leadership role, particularly in a fast-paced, service-oriented environment. (Preferred)
- Experience in complex higher education environments, serving academic and administrative functions of a large public university. (Preferred)
- Thorough operational understanding of directory services (e.g., Active Directory, LDAP), Single Sign-On (SSO) technologies, multi-factor authentication (MFA) solutions, role-based access control (RBAC), identity governance and administration (IGA), and privileged access management (PAM). (Required)
- Demonstrated understanding of privacy and security regulations and best practices, including federal and state laws, policies and standards, as well as knowledge about security regulations relevant to higher education. (Required)
- Demonstrated interpersonal skills in order to communicate with both technical and non-technical personnel at various levels in the organization. (Required)
- Has practical, operational knowledge in the field of IAM sufficient to contribute to tactical planning and the assessment and direction of current technologies. (Required)
- Advanced written and verbal communication skills and is able to communicate work assignments to medium-sized teams. (Required)
- Demonstrated leadership/management skills, including abilities in persuasion, negotiation, change management, and mentorship. (Required)
- Advanced project management skills with demonstrated experience delegating responsibility, tracking project progress, supervising others, and advising teams on competing priorities. (Required)
- Inspires creativity in others and advises teams on industry-leading practices, such as the incorporation of new technologies or processes. (Required)
Education, Licenses, Certifications & Personal Affiliations
- Bachelor's Degree in one or more of: information technology, cybersecurity, computer science, public administration, business administration, communications, or a related field, or equivalent experience/training. (Required)
- Bachelor's Degree in one or more of the following fields: information technology, cybersecurity, computer science, public administration, business administration, communications. (Preferred)
Special Conditions for Employment
This position is eligible for a hybrid work arrangement that includes regular visits to campus as needed (for those who work remotely, travel/lodging expenses are not eligible for reimbursement).
NOTE: This position REQUIRES that a RESUME and COVER LETTER be submitted in addition to the application. Please have these two files ready to upload when applying.
- Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation.
- Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment.
Schedule
8:00 A.M. to 5:00 P.M. PT, Monday through Friday and/or variable based upon operational needs.
Union/Policy Covered
99-Policy Covered
Complete Position Description
#J-18808-Ljbffr