AVP - Cyber Engineering, Architecture and Identity Management
Listed on 2026-01-19
-
IT/Tech
Cybersecurity, Information Security, Systems Engineer, IT Consultant
We've made a lot of progress since opening the doors in 1942, but one thing has never changed - our commitment to serve, heal, lead, educate, and innovate. We believe that every award earned, every record broken and every patient helped is because of the dedicated employees who fill our hallways.
At Ochsner, whether you work with patients every day or support those who do, you are making a difference and that matters. Come make a difference at Ochsner Health and discover your future today!
This job assumes responsibility for establishing and maintaining an enterprise-wide information security program to assure information assets are adequately protected. Exhibits expertise of Information Security best practices and regulatory and compliance requirements that impact security for the enterprise including, but is not limited to HIPAA, HITECH, and PCI. Sets policies and standards that direct security functions relative to information technology systems, networks, applications, voice and data communications and computing services within the enterprise;
proactively works with senior leadership to assure security programs and technical controls are in compliance with policies, applicable laws and regulations and effectively protect information and information systems; and works in partnership with business management to assure business practices meet defined policies and standards for information security.
The AVP of Identity & Access Management, Cyber Engineering, and Cyber Architecture is responsible for the strategic leadership and execution of enterprise-wide identity governance, access management, cyber engineering, and security architecture initiatives. This role ensures the secure design, implementation, and continuous improvement of security controls, platforms, and processes, aligning with the CISO’s strategy, organizational goals and regulatory requirements.
Key Responsibilities Identity & Access Management (IAM)- Develop and execute a multi-year IAM roadmap aligned to NIST CSF and regulatory frameworks (e.g., HIPAA, PCI).
- Oversee identity lifecycle management, including governance, provisioning, deprovisioning, and access certifications.
- Lead the implementation of risk-based authentication, SSO, MFA, and privileged access management (PAM) solutions.
- Optimize IAM processes through automation, reducing manual interventions and improving user experience.
- Develop and execute Role Based Access Controls.
- Direct the engineering, deployment, and maintenance of security technologies (e.g., SIEM, SOAR, endpoint protection, firewalls, cloud security tools).
- Oversee the integration of security solutions with enterprise platforms, ensuring scalability, reliability, and compliance.
- Work with the AVP of security operations on vulnerability management, threat detection, and incident response engineering efforts.
- Evaluate emerging security technologies to address evolving threats and business needs.
- Define and maintain the enterprise security architecture, ensuring alignment with business objectives and risk appetite.
- Develop and enforce security standards, patterns, and reference architectures for on-premises and cloud environments.
- Collaborate with IT, application, and infrastructure teams to embed security by design into all technology initiatives.
- Conduct architecture reviews and risk assessments for new and existing systems, recommending improvements and mitigation strategies.
- Manage and mentor cross-functional teams, including IAM specialists, security engineers, and architects.
- Partner with stakeholders across IT, compliance, audit, and business units to drive security awareness and accountability.
- Prepare and present executive-level reports on security posture, program maturity, and key risk indicators.
- Ensure security programs and controls meet internal and external audit requirements.
- Lead periodic access reviews, control testing, and evidence collection for regulatory compliance.
- Monitor and report on the effectiveness of security controls, driving continuous improvement.
- 10+ years of progressive…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).