Program Manager, Identity Access Management UCLA Information Technology Services As a part of IT Services' Information Technology Security team, the Program Manager, Identity Access Management (IAMUCLA) leads the business analysis and the operations of UCLA's identity and access management services. The incumbent works among functional and technical middleware and information management specialists to design, implement, and operate UCLA's enterprise identity, authentication and access management services. The Program Manager represents UCLA at University of California's UC Trust identity federation, collaborates with UCLA, UC, and Higher Education IDM community members to research, identity, and evolve UCLA and UC's identity and access management technologies and processes. General responsibilities include supervise the IAMUCLA team to perform the day-to-day operation and 2nd tier service support maintain comprehensive documentation of IAMUCLA processes and procedures develop business cases related to IAMUCLA services establish product and service roadmap develop and manage detailed project plans conduct resource analysis collaborate with campus leadership to drive program development perform IAMUCLA program and services outreach work with hardware and software providers (internal and external) to deliver solutions that meet campus IAM requirements. The incumbent will also participate in IAM-related policy and architectural development and review. Desired qualifications Minimum of six years of experience managing information technology projects, services andor programs. Bachelor's Degree in Information Systems, Computer Science, Engineering (or related) OR ten years of equivalent relevant professional experience. Advanced knowledge of federated identity and access management principles, practices, and operations, particularly in higher education. Hands-on, technical experience developing identity management (single sign-on, directory, access management) tools and solutions. Strong analytical skill and knowledge, particularly in systems integration and processes. Excellent organizational, written and oral communication skills to work effectively with technical and non-technical personnel at various levels in the organization demonstrated experience in the effective delivery of presentations to executives and staff. Ability to develop and maintain effective professional relationships with colleagues within the organization and partners across vendor and higher education. Knowledge of program and project management methodologies and tools track record of success in managing mid to large scale IT projects. Demonstrated ability to develop business cases, project plans, resource requirements and project cost estimates for moderate to complex initiatives ability to deliver projects within budget and on time. Experience with conducting research into emerging technologies and applying research to business. Demonstrated knowledge of fiscal matters including budget development, forecasting and variance analysis (Preferred). Experience developing IT and business policies and procedures (Preferred). Experience working in a higher education institution (Preferred). Masters of Business Administration, with an emphasis on Information Technology (Preferred). How to apply Interested candidates may apply by clicking the \"APPLY NOW\" button on this page. Alternatively, visit our UCLA Career Opportunities website at httpshr.mycareer.ucla.edu and search for requisition 29121. The University of California is an Equal OpportunityAffirmative Action Employer advancing inclusive excellence. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, or other protected categories covered by the UC nondiscrimination policy. httppolicy.ucop.edudoc4000376NondiscrimAffirmAct UCLA is a Tobacco-Free environment. For more information, please view the policy at httpsccle.ucla.educourseviewUCLAtobaccofreetaskforce Associated topics: cybersecurity, forensic, information security, information technology security, leak, protect, security, security analyst, violation, vulnerability
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.