As a privately held, U.S.-owned and operated company, Crowley provides services to 36 nations and island territories. Our purpose is to bravely advance what's possible to elevate people and planet, with our core values of Integrity, Sustainability and Drive guiding everything we do.
By expanding and innovating our services, we have expanded our footprint in services within the Logistics, Land Transportation, Shipping, Wind and Fuel industries. Crowley and its affiliated companies have generated more than $3.5 billion in annual revenue through our people's focus on excellence and a culture that values everyone's voices and collaboration.
To continue laying the groundwork and challenge what's possible for our business, we seek to partner with individuals ready to elevate their careers with us.
SUMMARY: Responsible for ensuring secure access control by managing user identities, access levels, and related policies across all systems, collaborating with stakeholders, and staying abreast of industry best practices to mitigate security risks and comply with regulations; essentially acting as a subject matter expert for all aspects of identity and access management within the company.
GENERAL RESPONSIBILITIES: Define and execute a comprehensive IAM strategy aligned with business goals and security requirements. Create, enforce, and communicate IAM policies and procedures to ensure compliance with regulations and internal standards. Ongoing management of IAM tools and platforms (example, Single Sign-On, Access Governance, Privileged Access Management, Service Accounts). Manage user provisioning, de-provisioning, and access reviews to maintain least privilege principles. Perform risk assessments of IAM systems and identifying potential vulnerabilities. Investigating and responding to IAM-related security incidents. Conducts IS security risk assessments and compliance audits, evaluating hardware, firmware and software for possible impact on IS security, and the investigation and resolution of moderately complex security incidents. Provides updates on current Information security technologies and related regulatory issues and escalates to management as necessary. Provide guidance to other information systems security team members. Worke closely with IT teams, business units, and security teams to ensure IAM solutions meet their needs.
EDUCATION: Bachelor’s degree in computer science, business, information systems or a related field; or a combination of post high school education and experience equal to nine (9) years.
EXPERIENCE: 5 - 8 years of experience related to information security administration, project management, and/or application security. Proven experience in designing, implementing, and managing IAM solutions. Experience with scripting languages (e.g., PowerShell) for automation.
TECHNICAL PROFICIENCY: Proficient understanding of security issues, techniques and implications across one or more computer platforms. Expertise in IAM technologies like Okta, AD, Azure AD, AWS, Password Manager pro. Experience in reporting tools Power BI, Excel. Deep understanding of IAM principles, standards, and best practices. Strong knowledge of security concepts (authentication, authorization, encryption). Relevant certifications such as CISSP, CISM, CIAM.
COMPENTENCIES: Ability to communicate technical information effectively verbally and in writing. Ability to establish and maintain effective working relationships with internal/external business partners. Ability to function effectively with, or as part of a team. Ability to identify complex problems and review related information to develop/evaluate options and implement solutions. Ability to conduct information security audits and investigations. Ability to evaluate process effectiveness and develop change or alternatives. Ability to demonstrate effective customer service skills and provide technical/operational training. Ability to identify and/or document existing and new trend, as well as evaluate and predict their impact on the organization. Knowledge of and ability to apply the concepts, principles and practices of information security administration. Knowledge of training methodology and the ability to develop and facilitate technical/operational training to others.
OTHER: Fluent English/ Spanish.
JOB SCOPE: Position impacts the entire organization.
WORKING CONDITIONS: Normal office environment with little exposure to excessive noise, dust, temperature and the like. Extended use of a computer keyboard, viewing of a computer monitor and the ability to sit for long periods of time.
Primary Location
SV-SV-SAN SALVADOR
Work Locations
SLV-EL SALVADOR-SAN SALVADOR-SHARED SERVICES
Job
Info Tech
Organization
CTC SV 9403
Schedule
Full-time
Employee Status
Regular
Job Level
Day Job
Job Posting
Feb 28, 2025, 1:32:06 PM
Work Arrangement
Hybrid (Office/Remote) Employee