Post Job Free
Sign in

Senior Technology Security Engineer (IAM)

Company:
Pointwest Technologies Corp
Location:
Des Moines, IA
Posted:
June 04, 2025
Apply

Description:

About the job

Our client is all about working together to make an impact. As part of our team, you’ll have the opportunity to grow, contribute, and gain experience that matters. We strive to be caring leaders, close partners, and responsive experts—always supporting each other to do our best work. Join us, and let’s improve lives together.

The Senior Technology Security Engineer will be responsible for the design, build, deploy and support of our clients Privileged Access Management (PAM) platform implemented in CyberArk Cloud, including infrastructure, servers, services and privileged accounts that are part of the overall IT ecosystem.

The Senior Technology Security Engineer will collaborate with various teams to ensure the seamless integration and effective use of CyberArk for managing privileged access, monitoring, and securing sensitive accounts.

Serves as an information security subject matter expert on highly complex enterprise projects, software, and hardware enhancements. Assesses information security risks, recommends risk treatment, coordinates risk acceptance and remediation, and ensures appropriate remediation occurs. Serves as PAM subject matter expert, collaborates with stakeholders, offers guidance, and serves as main security point of contact during project planning and implementation and maintains the vendor relationship. Collects and provides documentation for internal and external audits and assessments. Oversees assigned security tools/services and vendor life cycle management.

Essential Functions

Serves as an information security subject matter expert on highly complex enterprise projects, software, and hardware enhancements.

Identifies information security risks, provides recommendations, builds, and configures solutions, and troubleshoots issues.

Collaborates with IT and security teams on project plans and meets with stakeholders to assess impacts and dependencies.

Leads project activities to ensure timely deliverables and supports the establishment of a roadmap by evaluating and recommending new tools

Leads highly complex information security projects across all security teams.

Designs, builds, deploys, and maintains information security systems, including identity governance and access management solutions.

Ensures the efficient operation of information security systems and resolves intricate security problems.

Researches, evaluates, and proposes new information security solutions. Aligns information security systems with architectural requirements and strategies.

Provides implementation and cost estimates for new solutions, including training requirements and system administration processes

Collaborates with stakeholders to ensure the efficient operation of information security systems in alignment with architectural requirements and strategies

Identifies and documents of highly complex information technology risks, assesses risk levels, recommends risk treatment, coordinates risk acceptance and remediation, and ensures appropriate remediation occurs

Serves as the primary contact on assigned internal and third-party IT processes, risk assessments, and audits.

Provides advice to key stakeholders on the security-relevant impact of findings

Serves as security subject matter expert, collaborates with stakeholders, offers guidance, and serves as main security point of contact during project planning and implementation

Leads troubleshooting sessions and knowledge transfers to resolve security issues including identity governance and access management

Recommends solutions for aligning technology areas with future needs

Collects and provides documentation for internal and external audits and assessments

Documents information security systems policies, procedures, standards, needed improvements, and guidelines

Maintains the document life cycle, including periodic reviews, updates, and approval cycles

Oversees assigned security tools/services and vendor life cycle management

Schedules vendor meetings to review products, services, and vendor/tool roadmaps

Drives renewals and new purchases through the our clients vendor management and purchase process

Education & Experience

Bachelor's degree, preferably in information security, information technology, or a related field, or equivalent relevant experience

Eight years of experience in information security, identity and access management, or related roles, including at least four years of experience in information security

Master's degree, preferably in information security, information technology, or a related field or equivalent related experience and six years of experience in information security, identity and access management, or related roles, including at least four years of experience in information security

Information security certifications (CISSP, CCSP, CCSK, AWS, Azure, Security+, CEH, GSEC) preferred

Prior experience in the insurance industry preferred

Knowledge, Skills, & Abilities

Advanced knowledge of information security and privacy standards, concepts, principles, technologies, and audit practices

Advanced knowledge of information technology including network, servers, cloud, and PKI/cryptography and identity and access management technologies

Excellent knowledge of identity and access management concepts, principles, technologies

Excellent ability to assess and report on information technology risks

Strong knowledge of Linux and Windows operating systems

Strong knowledge of secure cloud solutions within AWS, Google, and/or Azure cloud platforms

Strong ability to perform and create automation tasks with tools (i.e., PowerShell, Python) preferred

Experience in designing, building, and maintaining information security systems

Excellent analytical and problem-solving abilities

Strong verbal and written communication skills

Excellent ability to work effectively with others at varying levels

Excellent documentation skills

Ability to lead moderate to highly complex technology projects

Desired Skills

SailPoint File Access Manager

CyberArk Privileged Cloud

Atlassian BitBucket

Atlassian Confluence

AWS EC2, Lambda

SharePoint

Apply