IAM Architect at Remote, Remote, USA |
Email: [email protected] |
From: Alex, quantig.com [email protected] Reply to: [email protected] Hi, Title: IAM Architect Location : 100 % REmote Duratuion: LOng Term J.D: 1. Overall 10+ years of hands-on working experience in the Identity and Access Management area at the enterprise level. 2. The person must be able to understand and gather business requirements, translate them to technical requirements and design the solution to meet the tactical and strategic approaches. 3. The person must be able to produce architectural patterns and solution design documents. 4. A hands-on technical experience is required to conduct the POC and solution design in a development environment. 5 Must have the ability to lead the discussion with various folks including business, engineering, and operation teams. 6. The person must be an expert in Authentication & Access Management area and related technology. 6.1. Authentication space (7+ years): 6.1.1.Multi-factor authentication (MFA) including password less MFA 6.1.2.Security knowledge of various technology & protocols - FIDO, PKI, Mobile MFA, OTP, FIDO key, Biometric authentication, behavior & risk-based authentication 6.1.3.Implementation experience with web, device (laptop, etc.), infrastructure, and API authentication use cases. 6.1.4.Mobile security knowledge is a plus. 6.2. Access Management space (7+ years): 6.2.1.Identity Federation & Single Sign-On (SSO) 6.2.2.Expert knowledge of implementing SAML, OpenID Connect (OIDC), and OAuth 2.0 6.2.3.Security knowledge about session management 6.2.4.Identity gateway (proxy) and similar implementation knowledge 6.2.5.Continuous access control 6.2.6.Integration with cloud and on-premises systems including Azure AD, GCP, Salesforce, etc. 7. Should have REST API and JSON working experience. 8. Must have LDAP and Active Directory integration experience. 9. Should have some development experience in building POC and prototypes. 10. Working knowledge of some of the IAM products is required. 10.1. PingIdentity, Okta, HYPR, Axiad, ForgeRock, SiteMinder, TransmitSecurity, Azure AD, etc. 10.2. Centrify/Delinea, BeyondTrust, CyberARK, etc. 11. Azure and GCP cloud experience are a plus. 12. Zero trust implementation experience is a big plus. Keywords: active directory IAM Architect [email protected] |
[email protected] View all |
Fri Jun 07 17:29:00 UTC 2024 |