Description
About the Role: In this role, you will implement security solutions that enable users to access multiple applications and services. You will play a key role in supporting and resolving issues related to Identity Access Management, Identify Governance and Administration, and/or Privileged Access Management solutions. This Zero Trust Based program ensures that every user and device is verified and authenticated before accessing resources.
How you will make an impact:
- Work within established procedures and guidelines to provision/ de-provision and maintain user accounts and access permissions for one or more: Single Sign On, Identity Governance Access (IGA), and/or Privileged Access Management (PAM).
- Provide more complex and escalated user support, troubleshooting and resolving access issues, within guidelines and safeguarding all administrative credentials while ensuring timely access for validated users.
- Conduct regular audits of user access and permissions ensuring compliance with documented policies and procedures.
- Troubleshoot and resolve advanced IAM, IGA or PAM-related issues, including those escalated by Tier 1 engineers.
- Collaborate with other IT teams to integrate IAM, IGA or PAM solutions with other systems.
- Will work typical local office hours, except when changes are necessary outside of these hours or in the event of a system outage or security incident, which could occur at any time.
What we look for:
- Expanded understanding of IAM, and either IGA or PAM concepts and best practices.
- Demonstrated experience with IAM solutions and technologies (e.g., SSO, MFA, IAM platforms).
- Demonstrated experience with IGA solutions and technologies (e.g., Saviynt, SailPoint, Ping Identity) or PAM solutions (e.g., CyberArk, Teleport, StrongDM, Delinea, Beyond Trust)
- Proficient in scripting and automation (e.g., Python, PowerShell).
- Basic knowledge of security standards and compliance requirements (e.g., GDPR, SOX).
- Strong analytical and problem-solving skills.
- Confident ability to communicate and work as a team.
- Certifications (optional but beneficial): GSEC- GIAC Security Essentials, IAM-Certified Identity and Access Manager
Behaviors of Successful Candidates:
- Continuous Learning: Stays up to date with the information security management trends, threats, and technologies.
- Certifications: Seeks to obtain relevant certifications to grow skills and knowledge.
- Hands-on Experience: Desires gaining practical experience through lab environments, Proof of Concept or real-world scenarios.
- Networking: Joins communities, attends conferences, and engages with peers for knowledge exchange.
- Mentorship: Seeks mentorship from experienced professionals while also providing mentorship to other Information Security team members.
Skills
Python
PERL
IAM
Security standards
Industry Sector