SecOps Engineering – Privileged Access, Encryption & Identify Governance Tech

Eli Lilly and Company·
Malaysia, Petaling Jaya
1w ago
Full-timeNeurology

Description

<p style="text-align:left">At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. We’re looking for people who are determined to make life better for people around the world.</p><p style="text-align:inherit"></p><div><div><p><span><span>At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. </span><span>We’re</span><span> looking for people who are determined to make life better for people around the world.</span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span><span>Are you eager to make a significant impact in the cybersecurity field? We are seeking a Technical Lead role to infuse our team with innovative ideas and daring solutions. In this position, you will play a crucial role in delivering how our organization ensures secure, </span><span>appropriate</span><span>, and </span><span>timely</span><span> access to enterprise resources, while also supporting the capabilities that help us achieve and sustain our Identity and Access Management strategy. </span></span><span> </span></p></div><div><p><span><span>This role includes </span><span>an </span></span><b><span>on-call rotation</span></b><span><span> covering the weekends and country holidays, to support our ‘follow the sun’ model across Kuala Lumpur, </span><span>Cork</span><span> and the U.S. IAM teams</span><span>.  </span><span>On call coverage is </span><span>required</span><span> </span><span>on weekends between Saturday 5.00a.m. – Sunday 5.00p.m. </span><span>local time with responsibilities focused on resolving priority IAM requests. </span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><b><span>Why this role matters:</span></b><span> </span></p></div><div><p><span><span>The SecOps Engineering – </span><span>Privilege</span><span>d</span><span> </span><span>Access Management (PAM), En</span><span>cryption &amp; Identify Governance</span><span> Tech Lead role is a technical leadership role responsible for the delivery and support for the company&#39;s 24/7 identity platforms and services</span><span>.  </span><span>This role plays a critical part in ensuring the secure and efficient support of identity and access services within our organization. The responsibilities will encompass day-to-day operations, incident management, change management, and problem resolution related to IAM focusing on </span><span>PAM, </span><span>Encryption</span><span> and Identity Governance </span><span>services. This role will also collaborate with cross-functional teams to </span><span>maintain</span><span> compliance, address risks, and enhance our IAM program. This includes working closely with the Operation Manager, the Service Leads and other Technical leads to ensure alignment of priorities, </span><span>allocating</span><span> resources effectively, and driving operational excellence.</span></span><span><span> </span></span><span><span> </span></span><span> </span></p></div><div><p><span> </span></p></div><div><p><span> </span></p></div><div><p><b><span>What You&#39;ll Bring:</span></b><span> </span></p></div><div><p><span><span>Team and </span><span>Technical Leadership</span><span>:</span></span><span><span> </span></span><span><span> </span></span><span> </span></p></div><div><ul><li><p><span><span>Recruit, hire and develop </span><span>a high</span><span>-performing identity </span><span>operation </span><span>engineer</span><span>s</span><span>.</span></span><span><span>   </span></span><span><span> </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Provide coaching, career development, performance </span><span>management</span><span> and professional growth opportunities</span><span>.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Foster a culture focused on innovation, continuous learning, and operational discipline.</span></span><span><span> </span></span><span><span> </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Cultivate a diverse and inclusive team fostering different perspectives and backgrounds.</span></span><span><span>    </span></span><span><span> </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Keep </span><span>abreast of the latest developments in IAM technologies, security threats, and regulatory changes. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Drive the adoption of innovative and creative solutions to address complex, global IAM problems. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Ser</span><span>ve </span><span>as </span><span>technical lead </span><span>and </span><span>an </span><span>escalation point</span><span> for </span><span>team members</span><span>.</span></span><span><span> </span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><span> </span></p></div></div><div><div><p><span> </span></p></div><div><p><span><span>Operational Excellence:</span></span><span><span> </span></span><span><span> </span></span><span> </span></p></div><div><ul><li><p><span><span>Provide technical leadership in the execution and processes</span><span> for escalation</span><span>s</span><span>, incident management, change management, problem resolution and continuous improvement</span><span> that enable the support of 24/7 services</span><span>. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Continuously monitor </span><span>IAM </span><span>privileged access management</span><span>, </span><span>encryption</span><span> </span><span>and identity governance</span><span> systems</span><span> </span><span>performance</span><span> and</span><span> health to ensure </span><span>optimal</span><span> operation. Perform regular maintenance tasks to prevent issues.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Respond promptly to system alerts and incidents, troubleshoot issues, and implement solutions to restore services as quickly as possib</span><span>le.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Manage and </span><span>maintain</span><span> </span><span>all </span><span>components</span><span> of IAM </span><span>privileged access management</span><span>, </span><span>encryption</span><span> </span><span>and identity governance </span><span>systems</span><span>. Ensure that all systems are </span><span>up-to-date</span><span> with the latest patches and security updates.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Analyze system performance metrics and make recommendations for improvements. Implement changes to enhance system efficiency and reduce downtime.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Maintain detailed documentation of system configurations, procedures, </span><span>and </span><span>incident reports. Provide regular status updates and reports to management.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Work closely with other IT teams, developers, and stakeholders to ensure seamless operation of services. Communicate effectively to resolve issues and implement changes.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Assess current system capacity and plan for future growth. Ensure that resources are </span><span>allocated</span><span> efficiently to meet demand.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Provide technical support to users </span><span>as it pertains to issues and requests on Identity services</span><span>.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Support response to audit and compliance requests </span><span>pertaining to</span><span> Identity services.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Develop and implement solutions to resolve identified problems. Ensure that solutions are tested and </span><span>validated</span><span> before deployment.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Perform detailed root cause analysis and document findings. Develop and implement corrective actions to prevent recurrence.</span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Proactively </span><span>identify</span><span> opportunities for process improvements and implement best practices to enhance problem management processes.</span><span> </span></span><span> </span></p></li></ul></div><div><p><span><span> </span></span><span> </span></p></div><div><p><span><span> </span></span><span><span> </span></span><b><span>Your</span></b><span><span> </span></span><b><span>Basic </span><span>Qualifications:</span></b><b><span> </span></b><b><span> </span></b><span> </span></p></div><div><ul><li><p><span><span>Bachelor&#39;s degree in Computer Science</span><span>, Engineering or related technical field.</span></span><span><span> </span></span><span><span> </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>5</span><span>&#43; years of proven experience in </span><span>supporting</span><span>, </span><span>delivering</span><span> and securing</span><span> </span><span>Identity and Access Management</span><span> services</span><span> </span><span>deep </span><span>expertise</span><span> in areas like </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>5</span><span>&#43; years of experience in Identity and Access Management with deep </span><span>expertise</span><span> in areas of </span><span>privileged access management and encryption</span><span>, secrets management, Just </span><span>In</span><span> Time Access</span><span>, </span><span>internal certificate authority, public certificate provisioning, </span><span>enabling certificate management, and</span><span>/or</span><span> digital signatures</span><span>, </span><span>identity provisioning, access management, identity </span><span>governance</span><span> and administration.</span></span><span> </span></p></li></ul></div></div><div><div><ul><li><p><span><span>5&#43; </span><span>years experience</span><span> in CyberArk</span><span>, </span><span>Microsoft Identity Manager, Entra ID, and</span><span> SailPoint IIQ.</span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><b><span>Additional Preferences: </span></b><span> </span></p></div><div><ul><li><p><span><span>Experience with IT service management (ITIL)</span><span>.</span><span>  </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Effective collaboration with other technical counterparts, Leaders and Stakeholders, to deliver and </span><span>support</span><span> </span><span>IAM solutions. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Ability to work with a distributed and virtual team. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Critical thinking, analytical skills, and thought leadership. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Excellent communication and presentation skills, and ability to adapt messaging for diverse audiences.  </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>An understanding of common services used in cloud-based </span><span>architecture</span><span>, with experience in AWS and/or Azure, and awareness of cloud platform security and controls. </span></span><span> </span></p></li></ul></div><div><ul><li><p><span><span>Relevant certifications such as CISSP, CISM, or similar. </span></span><span> </span></p></li></ul></div><div><p><span> </span></p></div><div><p><span> </span></p></div></div><p></p><p>Lilly is dedicated to helping individuals with disabilities to actively engage in the workforce, ensuring equal opportunities when vying for positions. If you require accommodation to submit a resume for a position at Lilly, please complete the accommodation request form (<a href="https://careers.lilly.com/us/en/workplace-accommodation" target="_blank">https://careers.lilly.com/us/en/workplace-accommodation</a>) for further assistance. Please note this is for individuals to request an accommodation as part of the application process and any other correspondence will not receive a response.</p><p></p><p>Lilly does not discriminate on the basis of age, race, color, religion, gender, sexual orientation, gender identity, gender expression, national origin, protected veteran status, disability or any other legally protected status.</p><p></p>#WeAreLilly
Eli Lilly and Company

Eli Lilly and Company

PHARMACEUTICAL

Biologics Discovery

LocationINDIANAPOLIS, IN
Employees43,000
Open Jobs838
DiabetesOncologyNeuroscienceImmunology
View Company Profile

Pipeline

Glucagon receptor antagonist LY2409021N/A
LY2503029N/A
SelpercatinibN/A
Treatment for FibromyalgiaN/A
There are no interventions in this study. All participants complete online surveys.N/A