Job Description

BTG in partnership with the top ranked Insurance company in Florida has an immediate need for a Information Security Manager.

Requirements of the Information Security Manager

  • Bachelor's degree in computer science, or other security/technology related degree or 4 years of cyber security experience would be considered in lieu of a degree
  • 7+ years of experience in multiple disciplines of information security including IAM
  • Certified Information Systems Security Professional (CISSP) required
  • Certified Identity Management Specialist (CAMS), Certified Identity Management Professional (CIMP) preferred

Benefits of the Information Security Manager

  • Up to $60 per hour
  • Flexible Hours
  • Full time hours
  • Medical / Dental / Vision
  • 401k

Responsibilities of the Information Security Manager

  • Provides expert knowledge on defining entitlement requirements for application security / role-based access, working with Business and IT partners through implementation
  • Provides expert knowledge and direction on use of IAM service components to support the IAM governance framework. i.e. authentication and authorization services
  • Provides expert knowledge and direction on use of IAM service components to support appropriate reporting and analytics. i.e. user management and directory services
  • Ensures all developed rules are kept current, approved and when necessary changed, edited, or modified in a controlled manner by IT and business partners
  • Oversees the maintenance of records of review and approvals of authorizations services
  • On an annual basis, ensures that all IAM service components are reviewed for continuing suitability
  • Ensures the respective authorization and authentications matrices are maintained and periodically reviewed to ensure access permissions are valid and accurate
  • Ensures all entitlement requirements and IAM processes and practices are fully documented and auditable
  • Seeks ways to improve and streamline IAM processes, especially as it relates to scalability
  • Monitors the effectiveness of all IAM controls across the enterprise, working with respective IT partners to address downstream access security risks
  • Coordinates with Business and IT partners to implement new IAM service components and controls as required based on changes in strategic direction
  • Ensures Information Security Management and IT leaders are made aware of any access related risks through verbal and written communications
  • Oversees and conducts analytical reviews of IAM control design and operational effectiveness issues, working through remediation and resolution with IT partners, such as Enterprise Architecture and Engineering

If you believe that your skills and experience are a match for this position, please submit your most current resume and a recruiter will be in contact. Resumes can be submitted via e-mail to or apply on line at You may also give us a call at 904-998-9414 to speak to a Recruiter.

Application Instructions

Please click on the link below to apply for this position. A new window will open and direct you to apply at our corporate careers page. We look forward to hearing from you!

Apply Online