VP, Identity & Access Management Architect and Operations Lead
VP, Identity & Access Management Architect and Operations Lead
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
We are thrilled to be partnering with a globally leading provider of vacation ownership, rental, and resort experiences. Our client is renowned for its exclusive vacation club memberships, premier timeshare properties, and luxurious travel options spanning an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they offer highly flexible vacation solutions, including innovative points-based systems and robust exchange programs, all while operating under multiple well-known hospitality brands.
They are actively seeking a visionary Vice President, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategic planning, comprehensive evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.
The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The core objective is to dramatically enhance customer relationships and further expand accessibility across all their diverse experiences and destinations. Their ambitious goal is to solidify their position as a technology leader within the hospitality sector, and they are actively seeking seasoned professionals eager to bring their deep expertise to the organization long-term and drive this exciting evolution.
Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Crucially, the business intends to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: USD $175,000 annually
The Role:
Reporting directly to the VP of Information Security Architecture, this pivotal role will play an instrumental part in guiding and overseeing all critical IAM functions across the enterprise. This encompasses, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing intricate workflow and review certification processes, ensuring stringent audit and compliance readiness, orchestrating sophisticated hybrid cloud identity management, overseeing comprehensive privileged access management (PAM), and architecting robust authentication and authorization systems.
This leader must possess expert knowledge in modern identity management approaches, including advanced administration, innovative identity cloud services, intricate custom connector development, complex installation and configuration, meticulous performance tuning, and robust backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to seamlessly support other IT areas or functions as needed is required to navigate a dynamic and multifaceted IT landscape.
You’ll also be strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, optimal scalability, and peak performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and overarching strategy specifically around business-focused identity management and comprehensive information security.
Summary of Contributions:
- Complex Analysis & Strategic Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often adeptly manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
- Proactive Problem Resolution: Responds to, skillfully solves, and makes informed, impactful decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk and ensuring swift resolution.
- Operational Enhancement & Strategic Planning Support: Assists more senior associates in achieving overarching business results by identifying compelling opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and diligently achieving results against budget within the defined scope of responsibility.
- Continuous Professional Development: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to continuously enhance and increase skills and knowledge, embodying a deep commitment to lifelong professional growth.
- Adaptive Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team, demonstrating flexibility and adaptability.
Responsibilities:
- IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions, ensuring they meet enterprise-grade requirements.
- Holistic IAM Leadership: Architecting and managing comprehensively across all critical facets of IAM: Identity Governance, Access Management, and Privileged Access Management (PAM).
- Performance & Health Optimization: Proactively identifying and addressing complex issues related to IAM system performance, ensuring high availability, responsiveness, and seamless operation.
- Technical Integration Leadership: Providing crucial technical leadership for the seamless integration of IAM systems with other enterprise applications, cloud services, and foundational IT platforms.
- Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and the overarching business objectives, translating strategic goals into actionable security frameworks.
- Policy & Procedure Development: Developing, meticulously maintaining, and continually refining comprehensive IAM policies, procedures, and standards documentation that are clear, actionable, and enforceable.
- Stakeholder Requirements Translation: Collaborating closely and effectively with various business and IT stakeholders to deeply understand their specific IAM requirements and expertly translating these into precise, actionable technical specifications.
- Audit & Compliance Assurance: Performing regular and thorough audits to ensure that all IAM systems and processes strictly comply with established IAM standards, internal policies, and external regulatory mandates.
- Team Guidance & Mentorship: Providing expert-level support and valuable technical guidance to team members regarding complex IAM challenges, troubleshooting, and best practices.
- System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain resilient and secure against potential and emerging cybersecurity threats.
- Strategic Documentation: Meticulously documenting IAM strategies, architectures, designs, and systems for comprehensive future reference, internal reviews, and effective knowledge transfer across teams.
- Secure Application Development Participation: Participating significantly in major application development projects to design inherently secure architectures and ensure that developed systems rigorously align with the organization’s overarching security strategy and policy.
- Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established security standards.
- Team Capability Enhancement: Actively enhancing the Security team’s capabilities by providing direct mentorship to junior team members, fostering their professional growth and knowledge expansion.
- Information Security Championing: Championing information security principles and best practices on key customer feature development projects, contributing directly to designing secure architectures and ensuring developed systems align with the organization’s security strategy and policy.
- Digital Integration Methodology Leadership: Leading the definition and methodology for ensuring that applications and processes are fully and securely integrated with our digital and service delivery platforms.
- Third-Party Application Security Assurance: Ensuring that both company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications that meet these exacting standards.
- Architecture Documentation Creation: Creating detailed security architecture documentation, including comprehensive architecture frameworks, design patterns, and security standards.
- Cross-Organizational Partnerships: Partnering strategically with leaders across the Information Security and Data Privacy organization, as well as other key organizational leads, to foster a unified security approach.
- Complex Application Security Solutioning: Working directly with peers and/or third-party vendors to provide strategic mitigations and innovative solutions to overcome major application security hurdles, meticulously evaluating business strategies and requirements.
- Integration Analysis & Cost Estimation: Thoroughly studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions, aiding in strategic planning.
Skills and Attributes:
- Exceptional Critical Thinking & Thought Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the profound ability to comprehend highly complex problems, draw logical conclusions, make sound strategic decisions, develop practical and innovative solutions, and effectively negotiate to drive the closure of intricate challenges.
- Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence within a dynamic and ever-evolving environment.
- Broad IT & Security Domain Knowledge: Strong demonstrated knowledge spanning enterprise IT systems, diverse cloud solutions (IaaS, PaaS, SaaS), and a wide array of advanced security technologies.
- Superior Communication & Influence: The ability to communicate highly complex technical and strategic messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message effectively to different audiences and influencing outcomes.
- Diverse Cybersecurity Experience: Broad and diverse experience encompassing cybersecurity strategy, security operations, security architecture, cloud security, and deep, specialized expertise in identity and access management.
- Identity & Access Management Mastery: In-depth knowledge of identity management principles, various forms of role/attribute-based access control (RBAC/ABAC), and advanced authentication systems.
- Applied Cybersecurity Controls: Demonstrated technical proficiency in effectively applying cybersecurity controls within real-world, complex enterprise environments.
- Oversight of Complex Initiatives: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact and visibility.
- Executive-Level Engagement: The confidence and skill to engage executive-level stakeholders on complex security matters with limited oversight and guidance, providing strategic insights and recommendations.
- Strategic & Tactical Acumen: The capacity to think both strategically (long-term vision and planning) and tactically (immediate execution and problem-solving), combined with highly effective decision-making skills.
- Relevant Cybersecurity Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.) is a strong asset.
- Project & Problem Ownership: Demonstrable ability to independently drive projects to completion and take full ownership of complex problems within a demanding security environment, seeing them through to successful resolution.
- Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to effectively manage multiple, often competing, priorities.
Qualifications:
- Extensive Information Security Experience: A minimum of 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically focused on Information Security roles.
- IAM Management Experience: Proven experience managing mid to large-sized Identity Management operations (“shops”).
- Security Frameworks Expertise: Hands-on experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
- Cloud Identity Expertise: Demonstrated hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management solutions.
- Modern IAM System Proficiency: Demonstrated proficiency with modern, enterprise-grade Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.
Education & Certifications:
- Required Education: Bachelor’s degree in Computer Science, Information Technology, or a related discipline, or equivalent relevant work experience.
- Preferred Education: A Master’s degree in information security or a related discipline is highly preferred.
- Key Certifications:
- Certified Identity and Access Management (CIAM)
- Global Information Assurance Certification (GIAC) Identity Management
- OCI Oracle Identity Manager
- SailPoint IIQ Administrator
Job Features
Job Category | IT, Onsite, Security |