Lead IAM operations including onboarding/offboarding, access request fulfillment, audit/compliance coordination, ticket SLA management, training, process improvements, UAT coordination, and IAM documentation.
Bounteous is a premier end-to-end digital transformation consultancy dedicated to partnering with ambitious brands to create digital solutions for today’s complex challenges and tomorrow’s opportunities. With uncompromising standards for technical and domain expertise, we deliver innovative and strategic solutions in Strategy, Analytics, Digital Engineering, Cloud, Data & AI, Experience Design, and Marketing.
Our Co-Innovation methodology is a unique engagement model designed to align interests and accelerate value creation. Our clients worldwide benefit from the skills and expertise of over 4,000+ expert team members across the Americas, APAC, and EMEA. By partnering with leading technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success.
Security Access Management Lead is a member of the IT Security Team who will oversee and co-ordinate day-to-day responsibilities including employee/consultant on-boarding and off-boarding, fulfilling access requests, handling audit/compliance requests, troubleshooting access-related incidents, and providing exceptional customer service to end users and role owners.
The successful candidate will play a key role in all security access management related projects. The candidate must have a strong background in technology, security and metrics, and must be highly adaptive. The candidate must be highly organized and analytical and is expected to partner and mentor effectively with other teams on an ongoing basis.
Information Security Responsibilities
- Promote and enforce awareness of key information security practices, including acceptable use of information assets, malware protection, and password security protocols
- Identify, assess, and report security risks, focusing on how these risks impact the confidentiality, integrity, and availability of information assets
- Understand and evaluate how data is stored, processed, or transmitted, ensuring compliance with data privacy and protection standards (GDPR, CCPA, etc.)
- Ensure data protection measures are integrated throughout the information lifecycle to safeguard sensitive information
Specific responsibilities:
- Serve as a point of contact for Identity Access Management (IAM) support inquiries and escalations.
- Maintain a team schedule, including an after-hours on-call rotation.
- Prioritize and follow up on tickets according to established SLAs.
- Act as a subject matter expert for all IAM policies, processes, procedures, and technologies.
- Facilitate and ensure the company's Audit processes and other required periodic processes are completed promptly.
- Coordinate and facilitate fulfilling all Compliance and Audit requests, adhering to established deadlines.
- Build relationships and coordinate with key IAM stakeholders across the organization.
- Conduct ongoing training and outreach sessions with IAM team members, end users, role owners, and stakeholders.
- Identify and drive process improvements, self-service, and automation opportunities.
- Contributes to the identification of defects, bugs, or enhancements to the IAM platform.
- Facilitate and coordinate UAT and validation activities for IAM and other related deployments and changes.
- Create, update, and maintain documentation of IAM procedures and processes
Experience/Skills Required(5-10 years):
- Proficiency with Azure AD, Azure MFA, Azure PIM, and ServiceNow.
- 5+ years of IT Support experience focusing on IT Security and IAM.
- 2-3 years of leadership experience.
- Outstanding communication (verbal, written, and listening) and customer service skills.
- Familiarity with IAM and IT security controls, protocols, and best practices.
- Ability to interact with all levels of management.
- Self-starter with the attention to detail and ability to work independently and/or in a team setting.
- High level of accountability, integrity, and dependability.
- Strong time, project, and people management abilities.
- It is the continuing policy of General Re Corporation to afford equal employment opportunity to qualified individuals regardless of their race, color, religion, sex, sexual orientation, national origin, age, marital status, disability or citizenship and to conform to applicable laws and regulations.
- Berkshire Hathaway Company
Education Required:
- Bachelor's or master's degree in computer science, information systems or other related field, or equivalent work experience.
- Professional security management certification such as : ISC(2) Certified Information Systems
- Security Professional (CISSP), SANS GIAC Information Security Professional (GISP), GIAC-Security
- Expert (GSE), or Certified Identity and Access Manager (CIAM)
- The following are preferred and highly valued
- Proficiency with Varonis, Saviynt, and Beyond Trust.
- Familiarity with international data privacy regulations and best practices
We invite you to stay connected with us by subscribing to our monthly job openings alert here.
Bounteous is proud to be an equal opportunity employer. Bounteous does not discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, age, physical or mental disability, national origin, veteran status, or any other status protected under federal, state, or local law. Bounteous is willing to sponsor eligible candidates for employment visas.
#BI-Remote
#LI-Remote
Top Skills
Azure Ad
Azure Mfa
Azure Pim
Beyond Trust
Iam
Saviynt
Servicenow
Varonis
Similar Jobs at Bounteous
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Operate and improve security detection, response, and automation across SIEM/EDR platforms (CrowdStrike, Taegis, Varonis). Lead incident response, threat hunting, telemetry tuning, gap analysis, runbook updates, and AI governance monitoring while collaborating with offensive and defensive teams.
Top Skills:
Crowdstrike,Taegis,Varonis,Siem,Edr,Iaas,Soar,Ai-Driven Tooling
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Lead security operations efforts including refining detection logic, improving incident response and runbooks, performing gap analyses, implementing automation, monitoring SIEM/EDR telemetry, threat hunting, and ensuring data protection and AI-tooling governance.
Top Skills:
Ai-Driven ToolingCrowdstrikeEdrInfrastructure As A ServiceSecurity Automation And OrchestrationSIEMTaegisVaronis
Agency • Digital Media • eCommerce • Professional Services • Software • Analytics • Consulting
Lead client-facing data solutioning and pre-sales efforts for Consumer verticals, design executable data architectures, support pursuit to close, and provide ~50% hands-on delivery and architectural oversight while ensuring information security and data privacy compliance.
Top Skills:
Databricks,Snowflake,Aws,Azure,Gcp
What you need to know about the Charlotte Tech Scene
Ranked among the hottest tech cities in 2024 by CompTIA, Charlotte is quickly cementing its place as a major U.S. tech hub. Home to more than 90,000 tech workers, the city’s ecosystem is primed for continued growth, fueled by billions in annual funding from heavyweights like Microsoft and RevTech Labs, which has created thousands of fintech jobs and made the city a go-to for tech pros looking for their next big opportunity.
Key Facts About Charlotte Tech
- Number of Tech Workers: 90,859; 6.5% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: Lowe’s, Bank of America, TIAA, Microsoft, Honeywell
- Key Industries: Fintech, artificial intelligence, cybersecurity, cloud computing, e-commerce
- Funding Landscape: $3.1 billion in venture capital funding in 2024 (CED)
- Notable Investors: Microsoft, Google, Falfurrias Management Partners, RevTech Labs Foundation
- Research Centers and Universities: University of North Carolina at Charlotte, Northeastern University, North Carolina Research Campus

