Identity & Access Management Security - Sailpoint and Forgerock

  • GREEN SKY STAFFING
  • Sep 13, 2017
Contractor Information Technology

Job Description

Key responsibilities may include: •        Working with clients to develop Identity and Access Management strategies, architectures, and implementation plans •        Configuration and Implementation of I&AM products and risk mitigation •        Design and develop automated provisioning and reconciliation of IT resources •        Request-based application and resource provisioning •        RBAC authentication to entitled applications and resources •        Role based resolution of approvers for request approval flows •        Single Sign-on •        Ability to travel 100%   Basic Qualifications: •        Minimum of a Bachelor degree •        Minimum of 2 years experience working in one of the following areas: Application Security; PKI & Authentication; Identity & Access Management or Data Privacy & Security •        Minimum of 2 year experience in the consulting environment •        Minimum of 2 years experience with packaged or custom IAM solutions.   Preferred Skills: •        Industry-adopted security certification (e.g. CISSP) •        Minimum of a Bachelor degree in a technical field (e.g. Computer Science, CIS,MIS, Engineering) •        Experience deploying and implementing custom applications •        Experience with any of the following: o   Provisioning Onboarding o   RBAC Authorization models o   SSO WAC technologies Enterprise SSO o   Federation o   Directory Services Meta-Directory Virtual Directory •        Experience with any of the following Security areas: o   Information risk, privacy, and strategy (i.e. security and privacy policies, or risk assessments, or security and privacy compliance); o   Application security; (i.e. application security testing or security integrations with Systems Development Lifecycle (SDL) ) o   Infrastructure security; (i.e.- securing networks and servers or security monitoring) o   Identity and access management; (i.e. authentication methods, or provisioning, or entitlement management) o   Data security or encryption