- TekSynap (Battle Creek, MI)
- …systems. + Serve as a Cybersecurity Subject Matter Expert (SME) in Identity and Access Management , advising on all associated cybersecurity ... IT experience, including expertise in Identity , Credential, and Access Management (ICAM) or related cybersecurity disciplines. + Demonstrated supervisory… more
- TekSynap (Battle Creek, MI)
- …of relevant IT experience, including work with identity , credential, and access management (ICAM) or related cybersecurity functions. **Certifications** ... **Responsibilities & Qualifications** **RESPONSIBILITIES** + Perform Identity and Access Management (IAM) services to ensure confidentiality, integrity,… more
- Eaton Corporation (Galesburg, MI)
- …Summary** The IAM Specialist plays a critical role in shaping and securing Eaton's identity and access management landscape. This position is responsible for ... supporting the end-to-end onboarding of applications into enterprise Identity Governance and Access Management ...skills + Ability to work colaboratively on large scale cybersecurity initiatives + Patience and empathy when working with… more
- Eaton Corporation (Galesburg, MI)
- …* Build and maintain secure connectivity components (eg, edge gateways, device identity ). * Enable plant integrations in partnership with engineering and maintenance ... downstream analytics. * Embed OT/IoT security controls and coordinate with Cybersecurity Engineering. * Ensure compliance with IT governance and cybersecurity… more
- Stryker (Portage, MI)
- …development, and validation strategies, ensuring documentation aligns with Quality Management Systems compliance requirements. + Partner with cross-functional teams, ... and operations, to deliver quality, compliant products. + Oversee risk management using ISO14971 standards to ensure product safety, including defining critical… more
- Stryker (Portage, MI)
- …by partnering with R&D and cross-functional teams. + Lead risk management activities for new product development, including creating plans, conducting reviews, ... Collaborate with Product Security and R&D teams to implement cybersecurity best practices in product design. + Participate in...new hires in sales and field roles that require access to customer accounts as a function of the… more