Identity And Access Manager; Hybrid
Job in
Ottawa, Ontario, Canada
Listing for:
Green Shield Canada
Full Time
position
Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity, IT Consultant, IT Project Manager, Information Security
Job Description & How to Apply Below
Position: IDENTITY AND ACCESS MANAGER (HYBRID)
WHO WE ARE
When it comes to health, we’re always looking for waysto push for better. It’s why we were founded in the first place. In 1957, our founder, pharmacist William Wilkinson, witnessed a mother sacrifice her health by forgoing her own medicine to pay for her sick daughter’s prescription. He knew there had to be a better way. So, he introduced North America’s first prepaid drug plan, and Green Shield was born as a not-for-profit with a mission to support better health for all Canadians.
We aren’t just a health and benefits company. We’re the only not-for-profit social enterprise that brings worlds of coverage and care together, all in one place.
We’re noble challengers, purposefully building a better way and we need the best people to help us create a more holistic approach that takes care of the mind and body.
Our mission is to create better health for all Canadians, and we know that starts with our employees.
THE ROLE IN A NUTSHELL
Lead and manage the Identity and Access Management (IAM) team to ensure secure and efficient operations. Oversee IAM strategy, operations, technical implementations, and align IAM initiatives with enterprise goals.
RESPONSIBILITIES
Responsible for developing and executing a 3-year IAM strategy.Provide IAM related project support through direct participation and collaboration with all Security and IT teams as appropriate.Work with all business units to regularly develop, review, and integrate business roles with access groups and permissions in applications.Provide regular operational and trending reports on tickets and recommendations.Ability to leverage existing ITSM system to manage requests efficiently with the teamPerform root cause analysis and recommendations for process and IAM technology improvement, ensuring documentation of team processes and proceduresResponsible for IAM-related escalations and resolutions (onboarding, offboarding, access requests).Working with manager and CISO to align IAM strategy to enterprise strategy.Strong working knowledge with IAM technologies (Saviynt, SailPoint, Okta, Auth0, Microsoft Azure AD, OIM).Experience with cloud IAM solutions (Azure, GCP, AWS)Enforce IAM policies and compliance with regulatory requirements.Adherence to IAM best practices, including segregation of duties, least privilege, functional , privileged account management, and provisioning.Support Information Security Governance team in regular access reviews and audits.Strong written and verbal communication skills.Develop and present IAM and information security status to senior management.Responsible for adherence and management of IAM related OKRs and SLAs.Responsible for monitoring, managing, and forecasting resource load vs capacity.Train and mentor IAM team members. Provide regular coaching via ad-hoc engagements and established one-to-ones. Develop suitable succession plans.Collaborate with IT and security teams to ensure seamless integration of IAM solutions with user experience as a focus.Support IAM tool lifecycle (procurement, testing, implementation, licensing)WHO WE'RE LOOKING FOR
Bachelor's degree or diploma in cybersecurity, IT management, technology, computer science.Preferred certifications: CISSP, CISA, CISM, CIAM.Experience with IAM technologies (Saviynt, SailPoint, Okta, Auth0, Microsoft Azure AD, OIM).Strong leadership and management skills.Knowledge of industry regulatory and compliance requirements (OSFI, PCI, ISO
27001, SOC2, NIST-CSF, CSA)Strong technical background in Microsoft Active Directory, File and Operating SystemsExcellent communication and presentation skills.Ability to perform root cause analysis and provide recommendations.Experience in developing and executing IAM strategies.NICE TO HAVEs
Knowledge of scripting languages (Python, Power Shell).Familiarity with Zero Trust architecture.Security Operations and Security Governance background.Prior management experience with an information technology access provisioning team.Understanding of web proxy technologies (ZScaler)Folder Access monitoring and provisioning tools (Quest)THE CULTURE
We believe a career should be meaningful. Not just a means to earn a living. Our culture…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
Search for further Jobs Here: