Identity & Access Management Architect

Total System Services   •  

Columbus, GA

Industry: Accounting, Finance & Insurance


8 - 10 years

Posted 116 days ago

This job is no longer available.

Every day, the people of TSYS® and Netspend® improve lives and businesses around the globe through payments. We make it possible for millions of people to move money between buyers and sellers using our payments solutions including credit, debit, prepaid and merchant services.  We are "People-Centered Payments", and our team has the unique opportunity to help create a world in which payments make people's lives easier and better. This is both a tremendous honor and an important responsibility for those who accept the challenge. If you are looking to make a valuable difference for people everywhere — and for yourself — we may have the right place for you.

Summary of This Role

Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, HPNSK/Tandem, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures.

What Part Will You Play?

  • A successful candidate has experience providing architecture with at least half of the following technologies.  This experience should be in design/implementation/process improvement for CyberArk, RSA IGL, ADFS, Unix, Windows Server, Routers, Firewalls, SSO solutions, federation, and Cloud Identity Management.
  • Provides expertise and advice as a Subject Matter Expert (SME) for access administration and troubleshooting of Identity and Access Management (IAM) tools, applications and assigned technologies. This ensures appropriate access and meets internal/external data security requirements.
  • Reviews maintenance reports and violation logs to detect and employ solutions that deter existing and future unauthorized access that may be a threat to corporate, client, and team member security; designs controls to mitigate future threats.
  • Uses a comprehensive understanding of multiple IAM, operational and security technologies, to lead the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.

Essential Functions

  • 1. Collaborates with clients and other functional areas in the design of IT Roadmaps to illustrate architectural complexities and interactions of information systems with reference to IAM. Analyzes, refines and documents the business requirements of clients. Analyzes existing system to detect critical deficiencies and recommend solutions for improvement. Plans and designs information systems and implements updates within scope of established guidelines and objectives.

    2. Researches new technological advances to assess current practices for compliance with systems requirements. Recommends solutions to address current system needs, process improvements and controls. Assists in the Request for Proposal (RFP) and vendor selection process. Makes recommendations for future information system needs.  Assists with the creation of Project Charters, Sizing, Analysis and Justification of new projects to drive innovation within the IAM Systems footprint.

    3. Provides technical architecture and support across applications and guidance to other functional areas to define IAM software/hardware requirements and in planning and delivering IAM Solutions. Analyzes infrastructure and capacity planning.

    4. Employs a thorough knowledge of required procedures, methodologies and/or application standards, including Payment Card Industry (PCI) and security related compliance to write or modify software programs to include analysis, writing specifications and code, program installation and documentation for use with multiple application/user database systems. Maintains information systems by configuring software and hardware, tracking errors and data movement, and troubleshooting.

    5. Solicits feedback from internal customers and IT teams to understand how well information systems are serving customers.

    6. Responsible for helping drive IAM projects or assisting applications teams drive the IAM portion of their project acting as a SME to the Project Managers, Developers and other Customers.


SKILLS / KNOWLEDGE Having wide-ranging experience in Identity Management and Identity Governance, uses professional concepts and company objectives to resolve complex issues in creative and effective ways. Some barriers to entry exist at this level (e.g., dept./peer review). 

JOB COMPLEXITY Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results. Networks with key contacts outside own area of expertise.

SUPERVISION Determines methods and procedures on new assignments and may coordinate activities of other personnel, serves as the IAM Technical SME to IAM projects an initiatives as well as to COTS software evaluation and for new applications development across the Enterprise.

 SYSTEMS DESIGN: Capable of taking a systems approach to evaluating the current IAM Environment then architecting, designing and driving projects which enhance the overall IAM capability within the enterprise.  Capable of driving long projects which span months and years with significant incremental results.

Position Details:

  • Identify IAM Architecture Opportunities
  • Document Business and Technical Requirements
  • Form Working Groups and Gain Broad Buy In
  • Lead Research Teams or Perform Individual Research
  • Work with teams to deliver Architecture Solutions
  • Develop Project Charters –
  • Develop Executive Presentations for Justifying Projects
  • Act as SME on IAM Projects
  • Work with PMs on Detailed Tasks for Projects
  • Ensure appropriate training is recommended for TSYS IAM and GTS Personnel to Maximize investment.
  • Publish Standard Strategies, Patterns and Architectures
  • Work with an Internal Team to deliver Tactical and Strategic Roadmaps and Objectives
  • Publish IAM Architecture Patterns to Improve Security and Reduce Time To Market
  • Publish Architecture Standards to Allow Development teams to Create their Own Solutions which integrate into Corporate IAM systems.
  •  Provide an API centric infrastructure architecture which frees developers from waiting
  • Assist with high priority issues.
  • Sev 1 Issues
  • Security Vulnerabilities
  • Gaps and Issues
  • Coordinate with Other InfoSec Groups and Resources
  • Application Architecture
  • Security Architecture
  • Application Security
  • Business Information Security Officers
  • Threat Management Center

What Are We Looking For in This Role?

Minimum Qualifications

  • Bachelor's Degree
  • Relevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experience
  • Typically Minimum 8+ Years Relevant Exp
  • Responsible for the implementation, security, maintenance and access administration of information security managed technologies
  • Must have the ability to pass and maintain a government level security clearance

Preferred Qualifications

  • Bachelor's Degree
  • Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
  • Typically Minimum 4 Years Relevant Exp
  • Experience supporting UNIX, Windows Server, mainframe and/or HP NonStop systems. Experience with remote administration tools, basic networking concepts, Help Desk support, scripting/programming and/or logical access administration using security products (ACF2, Active Directory, LDAP, etc.).
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred

What Are Our Desired Skills and Capabilities?

  • Skills / Knowledge - Having broad expertise or unique knowledge, uses skills to contribute to development of company objectives and principles and to achieve goals in creative and effective ways. Barriers to entry such as technical committee review may exist at this level.
  • Job Complexity - Works on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Creates formal networks involving coordination among groups.
  • Supervision - Acts independently to determine methods and procedures on new or special assignments. May supervise the activities of others.
  • Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problems
  • Applications and Systems - Utilizes, configures and monitors security using Identity and Access Management technologies to meet internal and external requirements for data security
  • Project Management - Plans, organizes, motivates and controls resources to achieve defined goals

Not Ready to Apply?  Join Our Talent Community!!

US Applicants:
TSYS is an equal opportunity employer (EOE) committed to employing a diverse workforce and sustaining an inclusive culture. For more information about your rights, click here.