Home

Cyber Security at Iselin, New Jersey, USA
Email: [email protected]
From:

anusha,

kksoftwareassociates

[email protected]

Reply to: [email protected]

Position:-
Cyber Security

Location: - Iselin, NJ

JD:-

Create Authentication and Multifactor Policies based on Network Zones androuting rules. 17. Integrate Directories exists from Mergers and Acquisitions with IAM systems. 18. Contribute in requirement gathering, design documentation of Identity, Access and PAM solutions. 19. Integrate various platforms with PAM solutions, such as different LDAP providers,Windows servers, UNIX servers, Databases, networking Devices, middleware andcustom applications. 20. Troubleshoot PAM Components for operational issues. 21. Work with HR Service Center, HR IT team for maintaining Integrations between HR, IAM and downstream systems. 22. Maintain IAM Servers, services, agents and ensure proper patching and upgrades.

Cyber Security, Cyber Security-EVM - Application Security

Develop and execute a comprehensive product strategy and vision thatconsistently deliver value to customers and results in increased user satisfaction of product usage. 2. Assist senior management with planning and scoping of IT and Security initiativesrelated to Identity and Access Management. 3. Establish and monitor key success metrics including cost, feature functionality,risk posture, and reliability, utilizing data-driven insights to drive continuousimprovement and optimize product performance. 4. Ensure accurate team capacity reporting to accommodate demand projections andoptimize resource utilization, contributing to the timely delivery of projects andinitiatives. 5. Conduct and attend technical discussion sessions with ApplicationVendor/Development teams/Application owners to identify and suggest suitablesecurity solutions with SSO services, MFA and provisioning services. 6. Provide timely progress reports to stakeholders, highlighting achievements andidentifying delivery risks along with mitigation strategies, fostering transparency andaccountability within the team. 7. Managing operations of Identity and Access Management solutions in clientenvironment using PowerShell , Okta (Workforce , Customer), MS Entra, Delineawith specialties below

Regards,

Anusha
- Recruiter - KK Associates LLC.

8751 Collin McKinney Pkwy, # 1302, McKinney, TX 75070

555 Metro Place North, Suite # 100, Dublin, OH 43017

| Email:

[email protected]

Web:

www.kksoftwareassociates.com

Keywords: information technology microsoft New Jersey Ohio Texas
Cyber Security
[email protected]
[email protected]
View all
Fri May 31 09:30:00 UTC 2024

To remove this job post send "job_kill 1441217" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 11

Location: Iselin, New Jersey