.Director, Identity and Access ManagementF5 application services ensure that applications are always secure and perform the way they should—in any environment and on any device.At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive.Business/Job Title: Director Identity & Access ManagementPosition SummaryWe are seeking a Director of Identity and Access Management in our Technology Services (TS) organization. This is a key leadership role responsible for developing and managing the identity and access management (IAM) engineering and operations and leading a team of IAM professionals. Key responsibilities include overseeing the design, implementation, and maintenance of IAM systems, including single sign-on (SSO), Privileged Endpoint Management (PEM), and Privileged Access Management (PAM), ensuring high availability and security of these systems, and identifying and mitigating risks related to identity and access management. The role also requires staying updated on the latest IAM trends and technologies, continuously improving IAM processes, and ensuring compliance with regulations. You will partner with key stakeholders throughout the organization to drive business growth and cultivate a culture of collaboration, continuous learning, and ongoing improvement.What you'll doDevelop, implement and maintain our IAM strategy, policies and standards for user and non-human identities and access privileges based on the evolving threat landscape.Lead a team of IAM engineers responsible for Single Sign On, Access Operations, Identity Lifecycle Management, Privileged Endpoint Management, Access Governance and Privileged Access Management.Maintain strong operational security monitoring health through active monitoring of service Key Performance Indicators (KPIs).Partner with peers across the Cybersecurity and Technology Services organizations to ensure alignment of cybersecurity objectives with business goals.Consult with architecture to ensure right tooling and processes are used to deliver IAM solutions.Partner with business stakeholders to streamline and automate IAM processes to enhance efficiency and user experience.Ensure compliance with SOX audit requirements through regular assessments and audits of identity and access management (IAM) systems and processes, maintaining rigorous documentation and controls.Handle external vendor relationships to ensure that service levels are being met