Cyber Security at Iselin, New Jersey, USA |
Email: [email protected] |
From: anusha, kksoftwareassociates [email protected] Reply to: [email protected] Position:- Cyber Security Location: - Iselin, NJ JD:- Create Authentication and Multifactor Policies based on Network Zones androuting rules. 17. Integrate Directories exists from Mergers and Acquisitions with IAM systems. 18. Contribute in requirement gathering, design documentation of Identity, Access and PAM solutions. 19. Integrate various platforms with PAM solutions, such as different LDAP providers,Windows servers, UNIX servers, Databases, networking Devices, middleware andcustom applications. 20. Troubleshoot PAM Components for operational issues. 21. Work with HR Service Center, HR IT team for maintaining Integrations between HR, IAM and downstream systems. 22. Maintain IAM Servers, services, agents and ensure proper patching and upgrades. Cyber Security, Cyber Security-EVM - Application Security Develop and execute a comprehensive product strategy and vision thatconsistently deliver value to customers and results in increased user satisfaction of product usage. 2. Assist senior management with planning and scoping of IT and Security initiativesrelated to Identity and Access Management. 3. Establish and monitor key success metrics including cost, feature functionality,risk posture, and reliability, utilizing data-driven insights to drive continuousimprovement and optimize product performance. 4. Ensure accurate team capacity reporting to accommodate demand projections andoptimize resource utilization, contributing to the timely delivery of projects andinitiatives. 5. Conduct and attend technical discussion sessions with ApplicationVendor/Development teams/Application owners to identify and suggest suitablesecurity solutions with SSO services, MFA and provisioning services. 6. Provide timely progress reports to stakeholders, highlighting achievements andidentifying delivery risks along with mitigation strategies, fostering transparency andaccountability within the team. 7. Managing operations of Identity and Access Management solutions in clientenvironment using PowerShell , Okta (Workforce , Customer), MS Entra, Delineawith specialties below Regards, Anusha - Recruiter - KK Associates LLC. 8751 Collin McKinney Pkwy, # 1302, McKinney, TX 75070 555 Metro Place North, Suite # 100, Dublin, OH 43017 | Email: [email protected] Web: www.kksoftwareassociates.com Keywords: information technology microsoft New Jersey Ohio Texas Cyber Security [email protected] |
[email protected] View all |
Fri May 31 09:30:00 UTC 2024 |