[Close] 

Manager, Identity & Directory Services

Come, be part of our Tapestry.
Defined by inclusivity rather than exclusivity, Tapestry is a global house of brands that embraces the exploration of individuality. Every individual in our global house has the opportunity to make an impact, learn and be part of our growing, beautiful, and unique story.
At Tapestry, we have the freedom to express ourselves and run with our best ideas across Coach, Kate Spade New York, and Stuart Weitzman. We share a profound belief in both our individual and collective potential, and know that with hard work and dedication, anything is possible.
Primary Purpose:
Tapestry is looking a leader who will provide subject matter expertise, coaching, and mentoring to their team across Tapestry Directory Services including Identity, Access Management and Active Directory Services.
The Technologist Identity and Directory Services is a true technical leader that inspires creativity, innovation and technical leadership to the team. A technical leader focused on the execution component that is agile and understands how to map the business needs to viable technology solutions and achieve desired results. A technical leader and subject matter expert in identity management and authentication technologies, directory services, and their implementation in large scale environment.
The successful individual will leverage their proficiency to...
Provide business solutions for the design, implementation, and support of Identify and Access Management and Microsoft Active Directory Services for Tapestry's world-wide information systems.
Define strategy for the evolution of Identity and Access Management services. Be an advocate of IAM and its adoption and maturity across Tapestry environment
Collaborate across IT and Infrastructure Technical Services to assess technical needs and determine requirements. Assemble and unite various IT groups around an aligned project strategy and design direction.
Define strategy for the management of Global Active Directory environment. Evaluate current landscape and make strategic recommendations related to multiple AD Forests.
Experience with roadmap ownership, use case creation, strategy development, KPI development, and customer relationship management
Manage environmental changes - consolidation, platform upgrades, and divestitures of Identify Access Management and Active Directory platforms.
Influence and collaborate with other senior leaders and teams as necessary to design solutions, resolve operational problems and minimize cycle time for problem resolution
Work closely with outsourcing partners for delivery of related services
Applies new solutions through research and collaboration with team and determines course of action for new application initiatives.
Directs continuous improvement processes and root cause analysis to eliminate waste and provide improvements to service level objectives
Ensure leaders are managing the standardization and implementation of administrative processes to allow for transition of repeatable work to level-one and level-two support
Partner with the Information Security and Compliance team to ensure compliance with policies Ensure all controls and procedures are being executed properly by teams to facilitate compliance objectives.
Provide direction on the selection of identity and / or directory services vendors, devices, tools and resources;
Provide guidance and direction in resolution of escalated issues and/or complex production, application or system problems
Provide guidance in Capacity planning, disaster recovery, performance tuning and testing, logical and physical architecture design
Knowledge to develop and execute complex deployment scenarios
Analyze technology industry and market trends, and determine their potential impact on the enterprise.
The accomplished individual will possess...
Experience:
Bachelor's degree in computer science, systems analysis or a related study, or equivalent experience
At least ten years of total IT experience
Significant experience within a medium to large scale Windows Enterprise or Identity Access Management deployment
Five to seven years of Architecture design experience in at least two IT disciplines in a client/server or service-oriented architecture (SOA) environment, including technical architecture, Identity and Access Management, Active Directory Services, Email management, network management, application development, middleware, database management or operations
Experience in PCI and Sarbanes Oxley requirements and any other control or governance frameworks
Soft Skills:
Strong leadership skills.
Ability to understand the long-term ("big picture") and short-term perspectives of situations.
Methodical approach to problem solving and resolution
Self-driven and resourceful to achieve goals independently as well as work well in groups
Flexibility to adjust to changing requirements, schedules and priorities
Exceptional interpersonal skills, including teamwork, facilitation and negotiation
Project management skills required Passionate, positive, and driven attitude
Excellent communication (written and verbal) and interpersonal skills is able to articulate to non-technical and technical audiences.
Reliable time management and organization skills
Conscientiously practices continuous improvement of processes
Excellent analytical and technical skills.
Excellent written and verbal communication skills.
Excellent planning and organizational skills
Ability to quickly comprehend the functions and capabilities of new technologies
Hard Skills:
Knowledge of all components of IAM and Directory technical architecture
Knowledge and hands-on experience in CA Administration, CA Identity Manager, CA Single Sign On, SAML, Federation PKI, RSA SecureID
Experience including assessment, design, pilot and upgrades/implementations of enterprise directory services technologies
Active Directory
TCP/IP including DNS integration
Group Policies (GPO)
Azure Active Directory
Active Directory Federation Services (ADFS), SAML, web Single Sign-on (SSO), OAuth and related authentication technologies
Microsoft Public Key Infrastructures Federated identity systems
Microsoft Radius/NPS Services
Understands application integrations for identify and access management
Multi factor authentication (MFA) both token and cloud
Knowledge and experience with Privileged access management and related technologies (Centrify, Random Password Manager, etc0
Experience with Enterprise File Sync and Share solutions a plus
Technologies: UNIX/Windows Servers, Oracle/DB2/SQL Databases, CDN's, Networking
Extensive experience with infrastructure and server theories, principles and concepts; application infrastructure and standards; networking fundamentals; Windows; Physical Server architecture; Virtualization Technologies (e.g. VMware, HyperV) and LAN/WAN/Firewall/VPN network technologies
Knowledge of IT security and regulatory compliance (PCI, PII, etc)
Advanced experience with SAML 2.0
Advanced experience with OAuth 2.0
Advanced experience with OpenID 2.0
Advanced experience with Security Token Services
Characteristics:
A respected technologist who works well with others.
Remains unbiased toward any specific technology or vendor choice; is more interested in results than personal preferences.
Is motivated by long-term results.
Tapestry, Inc. is an equal opportunity and affirmative action employer and we pride ourselves on hiring and developing the best people. All employment decisions (including recruitment, hiring, promotion, compensation, transfer, training, discipline and termination) are based on the applicant's or employee's qualifications as they relate to the requirements of the position under consideration. These decisions are made without regard to age, sex, sexual orientation, gender identity, genetic characteristics, race, color, creed, religion, ethnicity, national origin, alienage, citizenship, disability, marital status, military status, pregnancy, or any other legally-recognized protected basis prohibited by applicable law. LI-JW1 Visit Tapestry, Inc. at http://www.tapestry.com/
Req ID: 46022
Nearest Major Market: New York City
Nearest Secondary Market: Newark


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.