Home

IAM Security Engineer: Remote: 6+Month:Skype at Remote, Remote, USA
Email: [email protected]
From:

Kanchan Sharma,

Tek Inspirations LLC

[email protected]

Reply to:   [email protected]

Hello,

Hope you are doing well,

Please check the below job description and let me know if you have any suitable candidate for the same: 

Job Description -

LinkedIn Mandatory 

Title : IAM Security Engineer

Location: Remote

Duration: 6+ months

About the job

Qualifications: Musa have:

At least 5 plus years of Experience.

Degree in BA/BS.

Certification in Certified Ethical Hacker (CEH).

Provide expertise around data governance and be familiar with tools such as Microsoft Purview and equivalent.

Identity and Access Management

Roles & Responsibility:

Create Privacy and security documentation

Manage the workload and schedules for all changes and activities. Activities should include but not limited to patching, upgrades, supporting security exercises, migrations, vulnerability responsiveness, tagging and resource management, monitoring costs and services, and application health.

Control and manage access to the government environment.

Perform system/site administration for an enterprise-based solutions where applicable utilizing system graphical user interfaces (GUI) and scripts if needed.

Responsible for changes to enterprise system configurations, infrastructure, cloud services identity, and system management.

Comply with OIRM change management controls and processes.

Monitor and report on the performance of application components in the ACL cloud environments and update the configuration of the application environments to improve performance and address potential security vulnerabilities.

Provide support to manage data, privacy, access, monitoring, and identification of any personal identifiable information (PII) and protected health information (PHI) and any financial data.

Shall provide a security focused identity and access group that supports the proper provision of accounts and access to maintain zero trust and user management.

Providing access and role-based permissions to ACL systems and resources.

Shall be responsible for tracking identity and access requests, understanding the configuration settings and access structures for granting accounts and access permissions.

Ensure that all elevated and privileged accounts meet training requirements within ACL defined policies, monthly validation of accounts, and approvals from the COR once ACL OIRM leadership provides acceptance.

Have a security focused background to support this functional area.

Monitor ACL systems for indicators of cyber threats and data breaches using approved tools and reports.

Identify and report suspicious activity, files, code, or access.

Support the business or system owners on the creation and maintenance of each systems privacy impact assessment, as part of the SA process, for each ACL system.

Use the ACL identified privacy impact assessment (PIA), system privacy plan (SPP), and third-party tool evaluation templates as necessary.

Thanks & Regards,

Kanchan Sharma

IT Recruiter

TEK Inspirations LLC

13573 Tabasco Cat Trail, Frisco, TX 75035

Email:
[email protected]

Keywords: business analyst information technology Texas
IAM Security Engineer: Remote: 6+Month:Skype
[email protected]
[email protected]
View all
Tue Jul 02 02:58:00 UTC 2024

To remove this job post send "job_kill 1524596" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,