IAM Security Engineer::F2F::need to TX at Remote, Remote, USA |
Email: [email protected] |
From: Anurag, tekinspirations [email protected] Reply to: [email protected] Hi, I Hope you are doing great. Please find below position if you have any matching candidate as per requirement. Please send me updated resume with candidate information. Position: IAM Security Engineer Duration : 12+ months Location: Onsite for first 15 days than 50% remote (candidate needs to be local to Fort Worth, TX) Interview- Skype+ F2F Must be local to Dallas area only!!- Local to Dallas only , not whole Texas. 1. MOI: 1st round video, 2nd round onsite technical in Fort Worth, TX 2. The candidate will be expected to be in the office the first 15 days after they are brought onboard to work directly with the team. After that they will be working remote at least 50 of the time. They will not be designing they will be helping us build migrate deploy and maintain with a focus on the Identity Management platforms/system. This is a hands-on engineer/developer position. Looking for: 8 years of software design and development including at least 5 years of development experience with Identity and Access Management technologies 3 years of relevant hands-on technical management experience and 2 years of experience with cloud 3 years of design development and support experience with SailPoint IdentityIQ IIQ 8.x including Life Cycle Manager LCM and Compliance ManagerCM which includes hands on experience with the following SailPoint IdentityIQ components such as but not limited to Workflows Rules Connectors Security Policies Aggregation Jobs Roles: This engineering position would be responsible for the development deployment and support of Security Identity and Access Management solutions as directed by management and senior team members. Additionally this engineer will be responsible for troubleshooting and triaging issues monitoring system health deploying enhancements hot fixes and fix packs performing configuration changes in multiple environments and coordinating with key stakeholders from IT operations business teams and third party vendors. Must be able to assist with user identity administration and maintenance of user security roles and profiles. Must be able to provide technical guidance and possess the ability to compose articulate and present complex technical issues to peers management and clients to gain consensus and recommend and/or act to complete complex deployments. Certification Campaigns and Application Integration. Experience working in DevOps environment automation first mindset ability to leverage coding/scripting skills and working experience with APIs. Ability to compose articulate and present complex technical issues to both technicians and clients to gain consensus. Exposure to all and expert knowledge in three or more of the following technologies: Automated Provisioning Directory Services Application On-Boarding Password Management Re-certifications Access Requests Access Review Delegation Dynamic Organizations Role based Security Access Control Customer Identity Management. Fluency in more than one technology stack and expertise in several of the following: C C Java J2EE JSP Servlet EJB Application Client/Server LDAP RMI WAS Web Services WS-Security SAML HTML XML XSLT SOAP MQ Series LDAP / Active Directory Federation Protocols such as OpenID Knowledgeable in the following areas: Identity as a Service Mutual Auth for Service -Service PIM methodologies REST and REST Security Experience with DB2 SQL Server Oracle or another enterprise-class RDBMS Operating Systems like Windows AIX and Linux. SOX audit controls and applicability to IAM services architecture design and processes Java Application Interface Development and Object Models Enterprise Service Bus ESB technologies / JMS Advanced systems design Certifications is a plus Hands on experience with IBM Security Identity Manager ISIM is a plus Thanks and Regards, Anurag Singh Technical Recruiter TEK Inspirations Pvt. Ltd. | Desk : +4696388009 Email- [email protected] Disclaimar: This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited, To remove your email address permanently from future mailings, please send REMOVE to [email protected]. Keywords: cprogramm message queue information technology Texas IAM Security Engineer::F2F::need to TX [email protected] |
[email protected] View all |
Tue Jun 04 02:25:00 UTC 2024 |