See Similar Listings
Job   USA   FL   Jacksonville Area   Consultant   Various U.S. Employers -

Identity and Access Management (IAM) Consultant | Consultant in Consulting Job Job at Various U.S.1

This listing was posted on ListedBuy.

Identity and Access Management (IAM) Consultant

Location:
Jacksonville, FL
Description:

Position information: This position is a key member of the Cyber Security Administration and Engineering team responsible for the engineering, implementation, configuration, tuning and maintenance of customer identity and access management systems. The role will focus on systems and tools associated with external identity and access management capabilities including new implementations and optimization of existing technologies. The position will be responsible to support the introduction of technology and processes to optimize countermeasures for business services (Iaa S, Paa S, Saa S, Daa S, etc. ). Specific deliverables will support implementation of IAM technologies within Forge Rock, CA Site Minder, IBM and Oracle platforms and will include LDAP, SSO, SAML, OAuth and Web Services security (SOAP and REST). 1. Performs installation, testing, monitoring, configuration, migration, maintenance and troubleshooting of assigned technology2. Manages system/application environment and ongoing operations3. Proactively monitors and reports performance and utilization of assigned technologies4. Troubleshoots software and/or hardware issues/failures5. Resolves alerts and performs remediation activities6. Manages problem or escalated tickets and tasks and out of cycle requests from systems/software owners7. Collects and presents data for reporting and planning8. Assists with developing tactical strategies, processes and procedures related to systems/application administration9. Collaborates with IT and business area partners on work groups and initiatives10. Assist in identification of alternative configurations and approaches to enable business needs11. Serves as a liaison with IT and business area partners to identify, understand, document and advise on security requirements, impacts and risks.12. Develops and maintains documentation for security systems, procedures and security diagrams13. Analyzes, proposes and implements solutions concerning residual risk, vulnerabilities and other security exposures.14. Participates on assigned projects, ensuring that security best practices and requirements are considered and addressed.15. Participates in initiatives to identify, select and implement technical controls16. Develops info security processes, policies and procedures.17. Advises on service level agreements and works to ensure that security controls are managed and maintained.18. Other duties as assigned Must have: Identity and Access Management (IAM) experience Strongly preferred: API Security: REST and SOAP (WS-SE)Iaa S, Paa S, Saa S understanding Microservices experience (Kubernetes, Docker, etc. )Software development Lifecycle: Waterfall and Agile Additional Requirements: 2-4 years of experience in Systems and Info Security administration with at least 1-2 years professional ability related to Identity and Access Management programs More than 2yrs experience with the Forgerock stack: Open AM, Open DJ, and Open IDM More than 2yrs experience with the CA Site Minder stack. Hands on experience with the implementation of Identity Management/Identity & Access Management products (i. e. CA Single Sign-On, Forge Rock, etc. ). Hands on experience with implementing and supporting SAML and SSO technologies. Hands on experience with implementing and supporting REST Services secure gateway Knowledge of directory server (Oracle, TDS, AD, LDAP, etc. ) Experience with Oracle and SQL databases. Understanding of how to secure cloud-based solutions (e. g. Paa S, Saa S or Iaa S). Demonstrate a current expertise of multiple technologies and their interfaces and integration Competency in one or more environments highly integrated with an operating system Extensive experience implementing and administering/managing technical solutions in major, large-scale system implementations Knowledge of information security principles, including risk backssment and management, threat and vulnerability management, incident response and identity and access management Knowledge of network infrastructure including routers, switches, firewalls and associated network protocols and concepts. Experience developing, documenting and maintaining security procedures. Knowledge of operating systems and security applications, as well as a current expertise of basic network protocols and tools. Ability to manage tasks independently and take ownership of responsibilities Ability to learn from mistakes and apply constructive feedback to improve performance Strong customer focus with ability to manage customer expectations and experience and build longterm relationships. Strong team-oriented interpersonal skills with the ability to interface with a wide spectrum of people and roles including vendors and IT-business personnel. Ability to adapt to a rapidly changing environment Critical thinking skills to evaluate alternatives and present solutions that are consistent with business objectives and strategy. Preferred: Experience analyzing business requirements and translating them into technical solutions Industry standard Cloud certifications: Certificate of Cloud Security Knowledge (CCSK), Certified Cloud Security Professional (CCSP), Comp TIA Cloud Industry standard Cyber Security Certifications: Comp TIA Security, CSANS GIAC Security Essentials (GSEC), Systems Security Certified Practitioner (ISC2 SSCP)Comments for Suppliers: this role requires advanced checks to be completed as outlined in the handbook. - provided by Dice Associated topics: cybersecurity, identity access management, iam, info assurance, leak, security analyst, security engineer, security officer, violation, vulnerability
Company:
Various U.S. Employers
January 2 on ListedBuy
Visit Our Partner Website
This listing was posted on another website. Click here to open: Go to ListedBuy
Important Safety Tips
  • Always meet the employer in person.
  • Avoid sharing sensitive personal and financial information.
  • Avoid employment offers that require a deposit or investment.

To learn more, visit the Safety Center or click here to report this listing.

More About this Listing: Identity and Access Management (IAM) Consultant
Identity and Access Management (IAM) Consultant is a Consulting Jobs Consultant Job at Various U.S. Employers located in Jacksonville FL. Find other listings like Identity and Access Management (IAM) Consultant by searching Oodle for Consulting Jobs Consultant Jobs.