Company Summary Statement
As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities — PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy — provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL’s companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today.
Overview
The IT Cybersecurity organization advances the overall state of security at PPL through critical initiatives and coordination of large security and customer-focused projects. The organization builds and procures technologies, tools, and processes to better enable teams at PPL to develop secure platforms and protect data and systems with appropriate security controls. IT Cybersecurity also develops systems to monitor and respond to attacks against PPL systems, provides educational awareness to the corporation on security best practices, and ensures data sharing relationships with third parties securely protects PPL information.
This role will be part of the IT Cybersecurity – Identity and Access Management (IAM) team, which focuses on building out and supporting the IAM program at PPL. This program is responsible for all user access provisioning and de-provisioning, role-based access (RBAC), and privileged access management (PAM).
Location: This position is available remote or hybrid with working locations in Louisville, KY or Allentown, PA.
Responsibilities
Position may be hired at the Associate, Intermediate, or Senior level. Additional responsibilities may be assigned for higher levels of the role.
IAM Program
Participate on a team that has responsibility for ensuring user access is appropriately provided, approved, and reviewed on a continuing basis.
Support and implement technology that automates the administration of user access to business systems and applications.
Support and implement role-based access program for all types of logical access.
Create architecture and design based on requirements.
Create custom drivers, API integration, AD scripting, and SQL integration to Oracle and Microsoft SQL databases to implement the designed solutions.
Perform recurring system administration tasks and serve as the primary support for MicroFocus NetIQ IDM, RSA Identity Lifecycle and Governance, and internally developed IAM systems to assure system stability, reliable business processes and positive end-user experience.
Serve as a subject matter expert of the IAM support applications such NetIQ IDM, RSA Identity Lifecycle and Governance, CyberArk, and multiple internally developed IAM applications.
Provide troubleshooting of complex systems, workflows, application problems and issues.
Provide support and design of privileged access management program, including analysis of account privileges and automated password change development. Support compliance for regulatory programs, including NERC CIP, SOX, and FERC.
Monitor for access control failures through alerts and reports and determine root cause.
Support of interfaces between multiple systems for automation such as monitoring of accounts, provisioning, and de-provisioning.
Build and maintain strong cross-functional relationships across the organization to help with expectation setting, training and awareness, and promote consistency and improvement in our processes.
Find opportunities to continuously improve the program through innovation with tangible value to the organization.
Be an inspiring leader in Information Security and align initiatives with business objectives of the company.
General Security
Track and understand emerging security practices and standards by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
Research information security standards; conducting security patching; identifying integration issues.
Maintain security by monitoring, ensuring compliance to standards, policies, and procedures; participating in incident response analyses; and conducting training programs.
Assist in resolving security problems through the appropriate choice of error detection and correction, process control and improvement, or process design strategies.
Other
May be assigned an Electric Utilities emergency and storm role. This is a special assignment that comes into play during storms and other emergencies when the company needs to restore power or respond to other issues affecting customer service. This role may necessitate the need to work after-hours, outside of your normal schedule.Qualifications
Associate IAM Analyst: Bachelor’s degree OR 4 years of related work experience.
Intermediate IAM Analyst: Bachelor's degree and 2 years of related work experience OR 6 years of related work experience.
Senior IAM Analyst: Bachelor’s degree and 5 years of related work experience OR 8 years of related work experience.
Demonstrated understanding of IAM processes, Enterprise SSO, Federation, Privilege User Management, Authentication Methods, Entitlement Management, Delegated Administration, as well as the full scope of user account provisioning and lifecycle.
Understanding of the components necessary to implement and maintain a successful enterprise IAM program and a willingness to champion those requirements.
Proven ability to prioritize and execute tasks.
Highly self-motivated and directed with attention to detail.
Easily adapts to changing circumstances.
Understands business goals and strategic priorities.
A critical problem solver, detailed oriented, and highly motivated self-starter with a passion for constant learning & improvement.
Able to communicate relevant information clearly and concisely, both verbally and in writing
Able to work efficiently with minimal oversight/direction and collaborate effectively in cross functional projects.
Preferred Qualifications
Experience building, owning, and executing an IAM program in IT, utilities, or other major area.
Experience working with market leading identity and privilege access tools.
Experience with object-oriented languages, VB.NET, Java scripting.
Well versed in SQL and LDAP query logic for Oracle and Microsoft SQL database platforms.
Experience in database design, data modeling, stored database object development, PL/SQL scripting, UNIX/LINUX shell scripting, PowerShell scripting, and VB scripting.
Ability to install, modify and support hardware and software components of identity management (IDM) infrastructure. Experience in all elements of general system administration - Windows OS, UNIX/LINUX OS, SQL, Oracle, Microsoft AD, etc.
Experience with regulatory environments such as NERC and SOX requirements
Able to discuss issues at technical and business levels with audiences of various backgrounds.
Have great people skills and able to flourish under pressure and ambiguity in a fast-paced team environment.
Related work experience building and supporting an IAM program as a technical resource and a process owner that champions the product vision for process improvements and supports the current process.
Associate IAM Analyst: Bachelor’s degree OR 4 years of related work experience.
Intermediate IAM Analyst: Bachelor's degree and 2 years of related work experience OR 6 years of related work experience.
Senior IAM Analyst: Bachelor’s degree and 5 years of related work experience OR 8 years of related work experience.
Demonstrated understanding of IAM processes, Enterprise SSO, Federation, Privilege User Management, Authentication Methods, Entitlement Management, Delegated Administration, as well as the full scope of user account provisioning and lifecycle.
Understanding of the components necessary to implement and maintain a successful enterprise IAM program and a willingness to champion those requirements.
Proven ability to prioritize and execute tasks.
Highly self-motivated and directed with attention to detail.
Easily adapts to changing circumstances.
Understands business goals and strategic priorities.
A critical problem solver, detailed oriented, and highly motivated self-starter with a passion for constant learning & improvement.
Able to communicate relevant information clearly and concisely, both verbally and in writing
Able to work efficiently with minimal oversight/direction and collaborate effectively in cross functional projects.
Preferred Qualifications
Experience building, owning, and executing an IAM program in IT, utilities, or other major area.
Experience working with market leading identity and privilege access tools.
Experience with object-oriented languages, VB.NET, Java scripting.
Well versed in SQL and LDAP query logic for Oracle and Microsoft SQL database platforms.
Experience in database design, data modeling, stored database object development, PL/SQL scripting, UNIX/LINUX shell scripting, PowerShell scripting, and VB scripting.
Ability to install, modify and support hardware and software components of identity management (IDM) infrastructure. Experience in all elements of general system administration - Windows OS, UNIX/LINUX OS, SQL, Oracle, Microsoft AD, etc.
Experience with regulatory environments such as NERC and SOX requirements
Able to discuss issues at technical and business levels with audiences of various backgrounds.
Have great people skills and able to flourish under pressure and ambiguity in a fast-paced team environment.
Related work experience building and supporting an IAM program as a technical resource and a process owner that champions the product vision for process improvements and supports the current process.
Position may be hired at the Associate, Intermediate, or Senior level. Additional responsibilities may be assigned for higher levels of the role.
IAM Program
Participate on a team that has responsibility for ensuring user access is appropriately provided, approved, and reviewed on a continuing basis.
Support and implement technology that automates the administration of user access to business systems and applications.
Support and implement role-based access program for all types of logical access.
Create architecture and design based on requirements.
Create custom drivers, API integration, AD scripting, and SQL integration to Oracle and Microsoft SQL databases to implement the designed solutions.
Perform recurring system administration tasks and serve as the primary support for MicroFocus NetIQ IDM, RSA Identity Lifecycle and Governance, and internally developed IAM systems to assure system stability, reliable business processes and positive end-user experience.
Serve as a subject matter expert of the IAM support applications such NetIQ IDM, RSA Identity Lifecycle and Governance, CyberArk, and multiple internally developed IAM applications.
Provide troubleshooting of complex systems, workflows, application problems and issues.
Provide support and design of privileged access management program, including analysis of account privileges and automated password change development. Support compliance for regulatory programs, including NERC CIP, SOX, and FERC.
Monitor for access control failures through alerts and reports and determine root cause.
Support of interfaces between multiple systems for automation such as monitoring of accounts, provisioning, and de-provisioning.
Build and maintain strong cross-functional relationships across the organization to help with expectation setting, training and awareness, and promote consistency and improvement in our processes.
Find opportunities to continuously improve the program through innovation with tangible value to the organization.
Be an inspiring leader in Information Security and align initiatives with business objectives of the company.
General Security
Track and understand emerging security practices and standards by participating in educational opportunities, reading professional publications, maintaining personal networks, and participating in professional organizations.
Research information security standards; conducting security patching; identifying integration issues.
Maintain security by monitoring, ensuring compliance to standards, policies, and procedures; participating in incident response analyses; and conducting training programs.
Assist in resolving security problems through the appropriate choice of error detection and correction, process control and improvement, or process design strategies.
Other
May be assigned an Electric Utilities emergency and storm role. This is a special assignment that comes into play during storms and other emergencies when the company needs to restore power or respond to other issues affecting customer service. This role may necessitate the need to work after-hours, outside of your normal schedule.Remote Work
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among direct reports and co-workers.
Equal Employment Opportunity
Our company is an equal opportunity, affirmative action employer dedicated to diversity and the strength it brings to the workplace. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, national origin, protected veteran status, sexual orientation, gender identify, genetic information, disability status, or any other protected characteristic.