Vacancy expired!
- Manage a team of IDM analysts in the completion of provisioning/de-provisioning of access request, project request/support, and security initiatives.
- Act as the subject matter expert in the identity and access management domain. Contribute to the development of the client's enterprise identity and access management strategy.
- Ensures completion of day-to-day IAM support activities, including troubleshooting, customer service issues, escalations, incident handling, and privileged access requests.
- Responsible for the monitoring, measuring, performance, availability, security, recovery, and throughput of IAM services.
- Have a comprehensive, in-depth understanding of complex and highly technical Identity & Access Management concepts and principles of Cybersecurity.
- Define and document functional and technical requirements for integrating new or existing IAM platforms including provisioning, de-provisioning and integration of applications for authentication
- Interacts with other client's IT leaders to execute, advise, plan, build, test, and implement improvements of IAM operational maturity, services, and solutions.
- Ensures IAM service compliance with information security policies, standards, procedures, and IT controls.
- Ensure that the documentation and evidence of security requests comply with Sarbanes-Oxley compliance requirements, controls, and client's policies.
- Make strategic architectural recommendations related to technology direction and standards for logical access security.
- Provide technical support for stakeholders to integrate with applications.
- Be the internal expert using selected IDM solutions/tools, stay current on new technology & capabilities, assess functionality for consideration of implementation.
- Collaborate to develop and/or maintain the code for authentication service and utility libraries that integrate with the web and API applications.
- Partner with application development teams to integrate with authentication service and implement best practices for authentication and authorization requirements for internal and external applications.
- Diagnose and troubleshoot solution integration issues with application development teams during various SDLC phases including development, testing, UAT.
- Collaborate with Solutions Architects, Application Development, Cybersecurity, and Infrastructure to define the enterprise IAM strategy and communicate it to all application development teams.
- Develop artifacts that depict design components, how they are invoked, and how they exchange data to form the composite solution.
- Collaborate with Enterprise Architecture (AB), application development teams and Architecture Review Board (ARB) members to develop and refine application designs prior to presenting to the ARB.
- Adapt the architecture to evolving security conditions and support security guidelines.
- Develop security standards and participate in the SDLC process.
- Good working knowledge of a broad range of standards and frameworks - for example, NIST Cybersecurity Framework, International Standards Organization (ISO) 27001, IT Infrastructure Library and ISO 20000, Capability Maturity Model Integration and Six Sigma, etc. and relation application or controls
- 7+years of IT experience, with a minimum of 5 years with a logical access security focus and at least 3 years in a supervisory capacity.
- Bachelor's degree in Business, Information Systems, or related field of academic study.
- 5+ years' experience using one or more identity and access management tools. (e.g. ISIM, Okta, Ping, Onelogin, Centrify, Auth0, AWS Cognito, FIM, CyberArk, SailPoint, Oracle Identity Manager).
- 3+ years' experience using one or more privilege identity and access management tools. (e.g. CyberArk, Thyotic, etc.).
- Broad working knowledge of NIST Cybersecurity Framework, International Standards Organization (ISO) 27001 and 27002, and overall best business practices associated with IT Security.
- Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation.
- Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
- Strong analytical skills to analyze security requirements and relate them to appropriate security controls.
- An understanding of operating system internals and network protocols.
Vacancy expired!