IAM Security Engineer: Remote: 6+Month:Skype at Remote, Remote, USA |
Email: [email protected] |
From: Kanchan Sharma, Tek Inspirations LLC [email protected] Reply to: [email protected] Hello, Hope you are doing well, Please check the below job description and let me know if you have any suitable candidate for the same: Job Description - LinkedIn Mandatory Title : IAM Security Engineer Location: Remote Duration: 6+ months About the job Qualifications: Musa have: At least 5 plus years of Experience. Degree in BA/BS. Certification in Certified Ethical Hacker (CEH). Provide expertise around data governance and be familiar with tools such as Microsoft Purview and equivalent. Identity and Access Management Roles & Responsibility: Create Privacy and security documentation Manage the workload and schedules for all changes and activities. Activities should include but not limited to patching, upgrades, supporting security exercises, migrations, vulnerability responsiveness, tagging and resource management, monitoring costs and services, and application health. Control and manage access to the government environment. Perform system/site administration for an enterprise-based solutions where applicable utilizing system graphical user interfaces (GUI) and scripts if needed. Responsible for changes to enterprise system configurations, infrastructure, cloud services identity, and system management. Comply with OIRM change management controls and processes. Monitor and report on the performance of application components in the ACL cloud environments and update the configuration of the application environments to improve performance and address potential security vulnerabilities. Provide support to manage data, privacy, access, monitoring, and identification of any personal identifiable information (PII) and protected health information (PHI) and any financial data. Shall provide a security focused identity and access group that supports the proper provision of accounts and access to maintain zero trust and user management. Providing access and role-based permissions to ACL systems and resources. Shall be responsible for tracking identity and access requests, understanding the configuration settings and access structures for granting accounts and access permissions. Ensure that all elevated and privileged accounts meet training requirements within ACL defined policies, monthly validation of accounts, and approvals from the COR once ACL OIRM leadership provides acceptance. Have a security focused background to support this functional area. Monitor ACL systems for indicators of cyber threats and data breaches using approved tools and reports. Identify and report suspicious activity, files, code, or access. Support the business or system owners on the creation and maintenance of each systems privacy impact assessment, as part of the SA process, for each ACL system. Use the ACL identified privacy impact assessment (PIA), system privacy plan (SPP), and third-party tool evaluation templates as necessary. Thanks & Regards, Kanchan Sharma IT Recruiter TEK Inspirations LLC 13573 Tabasco Cat Trail, Frisco, TX 75035 Email: [email protected] Keywords: business analyst information technology Texas IAM Security Engineer: Remote: 6+Month:Skype [email protected] |
[email protected] View all |
Tue Jul 02 02:58:00 UTC 2024 |