AVP, Identity & Access Management Architect and Operations Lead
AVP, Identity & Access Management Architect and Operations Lead
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
We are excited to be partnering with a leading global provider in the vacation ownership, rental, and resort experiences industry. Our client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxury travel options across an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and exchange programs, all while operating under multiple well-known hospitality brands.
Our client is seeking a visionary AVP, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategy, comprehensive planning, rigorous evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.
The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The goal is to dramatically enhance relationships with customers and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader in hospitality, and they are actively seeking seasoned professionals eager to bring their expertise to the organization for the long term and drive this exciting evolution.
Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Critically, the business intends to double its spending on Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive innovation through advanced technology adoption.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: USD $175,000 annually
The Role:
Reporting directly to the VP of Information Security Architecture, this pivotal role will be instrumental in guiding and overseeing all IAM functions across the enterprise. This includes, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing workflow and review certification processes, ensuring audit and compliance readiness, orchestrating hybrid cloud identity management, overseeing privileged access management (PAM), and architecting robust authentication and authorization systems.
This leader must possess expert knowledge in modern identity management approaches, including administration, identity cloud services, custom connector development, complex installation and configuration, performance tuning, and advanced backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to support other areas or functions as needed is required to navigate a dynamic IT landscape.
You’ll also be responsible for strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, scalability, and optimal performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and strategy specifically around business-focused identity management and comprehensive information security.
Summary of Contributions:
- Complex Analysis & Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
- Problem Resolution & Proactive Solutions: Responds to, skillfully solves, and makes informed decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk.
- Operational Enhancement & Planning: Assists more senior associates in achieving overarching business results by identifying opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and achieving results against budget within the defined scope of responsibility.
- Self-Improvement & Continuous Learning: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to enhance and increase skills and knowledge, embodying a commitment to continuous professional development.
- Ad Hoc Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team.
Responsibilities:
- IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions.
- Holistic IAM Management: Architecting and managing across all facets of IAM: Governance, Access Management, and Privileged Access Management.
- Performance Optimization: Identifying and proactively addressing issues related to IAM performance, ensuring high availability and responsiveness.
- Technical Integration Leadership: Providing technical leadership for the seamless integration of IAM systems with other enterprise applications and platforms.
- Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and overarching business objectives.
- Policy & Procedure Development: Developing and meticulously maintaining comprehensive IAM policies, procedures, and standards documentation.
- Stakeholder Requirements Translation: Collaborating closely with various stakeholders to deeply understand their IAM requirements and expertly translate them into precise technical specifications.
- Audit & Compliance: Performing regular audits to ensure that IAM systems and processes strictly comply with established IAM standards and organizational policies.
- Team Guidance & Support: Providing expert support and valuable guidance to team members regarding complex IAM challenges and best practices.
- System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain secure against potential and emerging threats.
- Strategic Documentation: Documenting IAM strategies, architectures, and systems thoroughly for future reference, review, and knowledge transfer.
- Secure Application Development: Participating significantly in application development projects to design secure architectures and ensure that developed systems rigorously align with the MVW security strategy and policy.
- Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established standards.
- Mentorship: Enhancing the Security team’s capabilities by actively mentoring junior team members, fostering their growth and knowledge.
- Security Championing: Championing information security principles and best practices on key customer feature development projects to help design inherently secure architectures and ensure developed systems align with the MVW security strategy and policy.
- Digital Integration Leadership: Leading the definition and methodology for ensuring applications and processes are fully integrated with our digital and service delivery platforms.
- Third-Party Application Security: Ensuring that company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications to meet these standards.
- Architecture & Solution Documentation: Creating detailed security architecture documentation, including architecture frameworks, patterns, and standards.
- Cross-Organizational Partnerships: Partnering strategically with leaders across our Information Security and Data Privacy organization, as well as other key organizational leads.
- Complex Security Solutioning: Working directly with peers and/or third parties to provide strategic mitigations and innovative solutions to overcome major application security hurdles by evaluating complex business strategies and requirements.
- Integration Analysis & Cost Estimates: Studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions.
Skills and Attributes:
- Exceptional Critical Thinking & Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the ability to comprehend highly complex problems, draw logical conclusions, make sound decisions, develop practical solutions, and effectively negotiate to drive the closure of complex challenges.
- Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence in a dynamic and evolving environment.
- Broad IT & Security Knowledge: Strong demonstrated knowledge of enterprise IT systems, diverse cloud solutions, and a wide array of security technologies.
- Clear Communication: The ability to communicate highly complex technical messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message to the audience.
- Diverse Cybersecurity Experience: Broad and diverse experience spanning cybersecurity strategy, operations, security architecture, cloud security, and deep expertise in identity and access management.
- Identity & Access Expertise: In-depth knowledge of identity management principles, role/attribute-based access control (RBAC/ABAC), and various authentication systems.
- Cybersecurity Controls Application: Demonstrated technical proficiency in applying cybersecurity controls effectively within real-world environments.
- Complex Initiative Oversight: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact.
- Executive Engagement: The ability to confidently engage executive-level stakeholders on complex security matters with limited oversight and guidance.
- Strategic & Tactical Thinking: The capacity to think both strategically (long-term vision) and tactically (immediate execution), combined with effective decision-making skills.
- Relevant Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.).
- Project & Ownership Drive: Able to drive projects independently and own problems end-to-end within a demanding security environment.
- Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to handle multiple priorities effectively.
- Problem Ownership: Proven experience driving projects and owning problems completely within a security environment, seeing them through to successful resolution.
Qualifications:
- Extensive Information Security Experience: 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically in Information Security roles.
- Identity Management Leadership: Proven experience managing mid to large-sized Identity Management operations (“shops”).
- Security Frameworks: Experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
- Cloud Identity Expertise: Hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management.
- Modern IAM System Proficiency: Demonstrated proficiency with modern Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.
Education & Certifications:
- Required Education: Bachelor’s degree in Computer Science, Information Technology, or a related discipline, or equivalent work experience.
- Preferred Education: Master’s degree in information security or a related discipline is preferred.
- Key Certifications:
- Certified Identity and Access Management (CIAM)
- Global Information Assurance Certification (GIAC) Identity Management
- OCI Oracle Identity Manager
- SailPoint IIQ Administrator
Job Features
Job Category | IT, Security |