<p>Responsibilities</p><p>Manage and maintain LAN, WAN, and wireless network environments.</p><p>Configure, install, and support Cisco switches, routers, and firewalls.</p><p>Administer Linux servers and manage Active Directory, Office 365, and Teams.</p><p>Oversee Unity Call Manager system.</p><p>Deploy and manage wireless systems, specifically Meraki and Ruckus.</p><p>Implement and maintain network failover and business continuity solutions.</p><p>Collaborate with the SOC to monitor EDR, MDR, NDR, and SIEM tools.</p><p>Develop and maintain incident response plans.</p><p>Research emerging technologies and security risks.</p><p>Document IT procedures and automate processes where possible.</p><p>Communicate technical concepts to technical and nontechnical stakeholders.</p><p>Lead troubleshooting and outage resolution efforts.</p><p>Safety Management System (SMS) Requirements</p><p>Support safety practices and compliance initiatives.</p><p>Report hazards, unsafe conditions, and incidents immediately.</p><p>Follow safety rules, FAA requirements, and PPE guidelines.</p><p>Job Specifications</p><p>Knowledge, Skills, and Abilities</p><p>Strong planning, organization, and priority management skills.</p><p>Ability to interpret technical documentation and apply best practices.</p><p>Excellent troubleshooting and communication skills.</p><p>Ability to manage multiple initiatives under changing priorities.</p><p>Ability to remain composed and effective during critical incidents.</p>
<p><strong>Overview</strong></p><p>We are seeking a highly skilled Principal Analyst to support and enhance our Customer Identity and Access Management (CIAM) ecosystem across the organization. This role ensures secure, frictionless customer authentication and authorization by driving continuous improvement of identity platforms, regulatory compliance, security posture, and user experience.</p><p>You will serve as a technical and analytical subject matter expert partnering closely with cybersecurity, digital product, engineering, risk, and compliance teams. The ideal candidate thrives in a regulated environment, understands identity lifecycle management at scale, and is comfortable translating business needs into secure and scalable CIAM capabilities.</p><p><br></p><p><strong>Key Responsibilities</strong></p><p><strong>Identity Strategy and Platform Ownership</strong></p><ul><li>Lead analysis, configuration, and optimization of CIAM solutions supporting millions of customer interactions across digital touchpoints.</li><li>Develop and refine standards for identity lifecycle processes including registration, credential management, MFA, SSO, step-up authentication, and session security.</li><li>Partner with engineering and cloud teams to ensure CIAM integrations align with enterprise architecture, API patterns, and zero-trust principles.</li></ul><p><strong>Security, Risk, and Compliance</strong></p><ul><li>Ensure CIAM controls align with industry frameworks such as NIST 800-63, PCI, FFIEC, SOX, and internal cybersecurity policies.</li><li>Monitor authentication trends, fraud indicators, risk scoring, and threat intelligence to recommend improvements in customer security posture.</li><li>Conduct impact analysis and security assessments for new CIAM capabilities, feature enhancements, and vendor integrations.</li></ul><p><strong>Technical and Analytical Leadership</strong></p><ul><li>Translate business needs into detailed technical requirements, workflows, and acceptance criteria for CIAM enhancements.</li><li>Support troubleshooting, incident response, and root-cause analysis related to identity, authentication, access failures, and customer login issues.</li><li>Analyze customer behavior, authentication telemetry, and system performance metrics to drive continuous improvement.</li></ul><p><strong>Cross-Functional Collaboration</strong></p><ul><li>Work closely with Digital Product, Cybersecurity, Cloud Engineering, Fraud, Compliance, and Customer Service teams to optimize identity journeys.</li><li>Provide subject-matter expertise for projects involving customer onboarding, digital banking, mobile applications, APIs, and third-party integrations.</li><li>Evaluate CIAM vendors and assist in roadmap planning for authentication, federation, directory services, and cloud-native identity capabilities.</li></ul><p><br></p>
<p>What you'll do:</p><p>As the IT Manager III, you will lead the technical team including engineers, analysts, and testers to migrate current Digital Banking Platform to Q2’s Digital Platform. This digital transformation program will require you to participate in strategic and tactical planning for the delivery of Digital products and services as well as evaluate technology and set standards. Working in this role, you'll recommend improvements to established business processes while continuing to deliver high value in execution. You'll create and deliver on comprehensive project plans, remove any impediments, and track overall project performance to analyze the successful completion of business short-term and long-term goals. You will also collaborate with other cross functional teams such as middleware, data, security, infrastructure, IAM, CIAM to ensure timely delivery of the business requirements and priorities.</p><p>Manage teams responsible for delivering digital banking solutions </p><p>Lead data analysis, data mapping, and ensure data form the legacy platforms are correctly mapped and migrated to the targeted platforms </p><p>Implement safety procedures and data recovery plans. Develop user manuals, as well as policies, procedures, and safety protocols.</p><p>Partner with IT Leadership in the creation of a plan for employee development, retention, resource planning, talent management, performance management, and achieve a diverse and engaged workforce as well as recruit, train, and evaluate staff members work.</p><p>Work with IT Leadership in the preparation and management of the annual budget, business cases, execution plans, operating plans for the team and resources required to achieve established program priorities.</p><p>Ensure adequate risk management and security processes/controls are established and maintained in alignment with the risk appetite for the Bank, as well as applicable regulatory and enterprise risk management expectations.</p><p><br></p>