Carly K.
Details
Enterprise Technology Management
University of Colorado at Denver
2007 : 2012
Bachelor of Science (BS)
Computer Information Systems
Colorado State University
2001 : 2005
UL Solutions
Director, Global Cybersecurity IAM
2021 : 2023
Baxter International Inc.
Sr. Manager, Identity and Access Management
2021 : 2021
Hillrom
IT Lead, Identity and Access Management
Manages a team of people responsible for managing end-user identity, end-user application access, application resource access, directory maintenance, to include the user and application security life cycle from provisioning to de-provisioning of access rights. Provides orientation, identifies training needs, and/or train team members. Provides technical direction in the delivery of service to employees and communicates training and performance needs to team; uses various evaluation and feedback methods (checking work, problem time, etc.) to measure and communicate performance status to management
Manages account lifecycle management and applies knowledge on procedures, policies, instructions, and resolution of more complex situations. Applies principles and practices for Continuous Improvement and provides technical guidance on more complex issues. Analyzes and manages flow of work tickets and make recommendations for reducing ticket volumes or improving operational efficiency and efficacy. Reports on status and progress of work, causes of delays and generates professional presentation of metrics and reporting.
Develops strategy for identity and access management and communicates with leadership team to prioritize and implement strategy. Catalogs IT risks following and collaborates with other leaders to understand risk tolerance and develop a plan to mitigate the top risks.
Works with peer teams to identify business and technical requirements for new projects/releases. Acts as liaison, coordinating activities and resolving issues between teams, departments, divisions, agencies, vendors, etc. to maintain effective working relationships. Develops and maintains relationships with internal and external stakeholders, including regulatory and compliance teams.
2018 : 2021
The Hain Celestial Group
Sr. Manager, Identity and Access Management
2017 : 2018
Danone
IS/IT Application Security Manager
Skills
Business Intelligence, Business Process, Business Process Improvement, Cross-functional Team Leadership, Customer Service, Cyber Security Risk, Enterprise Resource Planning (ERP), ERP, Global IT Operations, Identity & Access Management (IAM), Information Security Governance, Information Security Management, Integration, Management, Materials Management, Process Improvement, Project Management, SAP, SAP BW, SAP ERP, SAP Implementation, SAP NetWeaver Business Warehouse (SAP BW), SAP Products, SAP R/3, Sarbanes-Oxley Act, Security, Strategic Roadmaps, Vendor Management
About
Experienced Sr. Information Security leader with more than 18 years specializing in Identity and Access Management. Demonstrated history of leading teams and delivering scalable IT solutions for global publicly traded companies in the consumer goods and manufacturing industries. Strong IT professional with an MBA specializing in Enterprise Technology Management from University of Colorado at Denver.
Leadership:
• Build high performing teams through collaboration and talent development.
• Embrace and promote change to keep pace with speed of business.
• Establish Security and Identity strategy.
• Prioritize value-added work to deliver positive ROI.
• Collaborate with cross-functional teams.
• Change-agile leader to ensure merger, acquisition, and divestiture success.
Identity & Access Management (IAM):
• Implement governance and standards to ensure repeatable processes.
• Automate IAM processes to deliver efficiencies.
• Privileged Access Management remediation.
• Implement Identity Governance (IGA) and Access Management (IAM) solutions
• Multifactor authentication.
• Single Sign-on.
• Access Management.
• Role Based Access Control (RBAC).
• Define and remediate Segregation of Duties (SODs) risk violations.
• HCM system integration and influence to develop cohesive Onboarding and Offboarding processes.
• Large scale enterprise system implementations.
Information Security:
• Implement NIST and ISO 27001 best practices for systems, policies, and procedures.
• Risk Management.
• IT Auditing & Compliance.
• Develop, implement, and perform controls to adhere to regulations such as SOX, GDPR and PCI.
• Incident Management.
• Security Awareness Training program.
• Vendor Management and due diligence.
• Project Management.
• ERP applications and implementations including SAP ERP, SAP NetWeaver Business Warehouse (SAP BW), Prism, Avantis, JDE, Adage, Hyperion, WMS applications, Deductions Management applications, Trade Promotion Management applications and other in-house applications.