Job Requirements
Remote
Public Trust Polygraph not specified
Senior Level Career (10+ yrs experience)
Salary not specified
Join Premium to unlock estimated salaries
Job Description
Position: RBAC / Identity Governance Engineer
Location: Remote
Duration: Long-Term contract
Job Description:
Role description:
• Defines the RBAC control framework and governance standards to ensure least privilege, SoD, and audit-ready traceability.
• RBAC model design (business/IT/technical role patterns)
• Role standards creation (taxonomy, naming, ownership, maintenance rules)
• Least privilege control design; policy-to-role translation
• SoD design and implementation patterns
• Audit-ready traceability/evidence design (role to entitlement to control mapping)
• Access governance design: request/approval patterns, exceptions, recertification cadence, break-glass/privileged patterns (as applicable)
• Role quality criteria definition (definition completeness, mapping logic rules, validation checks)
• Preferred experience with Databricks and Python
Primary focus: design authority for RBAC/IGA; risk/compliance alignment; stakeholder decisioning.
• RBAC strategy & design (own): role model approach (business/IT/technical roles), standards, naming, and role ownership model
• Controls & compliance (own): least privilege, SoD approach, evidence requirements, and audit-ready traceability
• IGA process design (own): request/approval, exceptions, recertification cadence, break-glass/privileged patterns (as applicable)
• Stakeholder alignment (lead): facilitate design decisions across security, business, HR, and application owners; resolve conflicts
• Quality & sign-off (approve): validate role definitions, mapping logic, and control alignment; approve pilot exit criteria
• Scale approach (define): phased rollout plan, change impacts, training approach, and steady-state governance
Location: Remote
Duration: Long-Term contract
Job Description:
Role description:
• Defines the RBAC control framework and governance standards to ensure least privilege, SoD, and audit-ready traceability.
• RBAC model design (business/IT/technical role patterns)
• Role standards creation (taxonomy, naming, ownership, maintenance rules)
• Least privilege control design; policy-to-role translation
• SoD design and implementation patterns
• Audit-ready traceability/evidence design (role to entitlement to control mapping)
• Access governance design: request/approval patterns, exceptions, recertification cadence, break-glass/privileged patterns (as applicable)
• Role quality criteria definition (definition completeness, mapping logic rules, validation checks)
• Preferred experience with Databricks and Python
Primary focus: design authority for RBAC/IGA; risk/compliance alignment; stakeholder decisioning.
• RBAC strategy & design (own): role model approach (business/IT/technical roles), standards, naming, and role ownership model
• Controls & compliance (own): least privilege, SoD approach, evidence requirements, and audit-ready traceability
• IGA process design (own): request/approval, exceptions, recertification cadence, break-glass/privileged patterns (as applicable)
• Stakeholder alignment (lead): facilitate design decisions across security, business, HR, and application owners; resolve conflicts
• Quality & sign-off (approve): validate role definitions, mapping logic, and control alignment; approve pilot exit criteria
• Scale approach (define): phased rollout plan, change impacts, training approach, and steady-state governance
group id: 90962964