Immediate Interview :: Identity Access Management (IAM) Administrator :: Washington, DC Hybrid 3 days Onsite at Washington, DC, USA |
Email: [email protected] |
From: Kevin Smith, Navtech Inc [email protected] Reply to: [email protected] Hi Folks, I have an opportunity for "Identity Access Management (IAM) Administrator - Washington, DC Hybrid 3 days Onsite" and I am looking for a candidate who can join Immediately if you are interested, reply to me with your updated resume or if you could refer someone I would really appreciate it. Job Title : Identity Access Management (IAM) Administrator Job Location : Washington, DC Hybrid 3 days Onsite Duration : 6 to 12 Months Contract At the time of submission, H1/EAD applicants must provide their passport number. ESSENTIAL DUTIES The position's essential duties include the following: Work with the Identity Access Management team to continue making enhancement to the Identity Access Management program. Manage user profiles, including access to groups, password reset, and multi factor reset. Manage and maintain standardized organization units, custom attributes, and security groups in Active Directory. General support, administration, and maintenance of systems. Work closely with development teams to perform User management, group management and Password management requests. Create and maintain Identify Access Management metrics. Troubleshoot identity and access management issues, and document resolutions within appropriate systems. Document various system access for all Users to store in a centralized repository (CMBD). Support efforts regarding audit findings, adherence to compliance and organizational change. Responsible for working incidents and service requests escalated by the Service Desk within the service level agreement. TYPE OF EXPERIENCE Bachelors degree and/or relevant technical training and certifications Three (3) to Four (4) years of directly related experience Two (2) to Three (3) years of experience performing server administration, either Windows and/or Linux/Unix Three (3) years of experience on cloud identity and access management systems Two (2) to Three (3) years of experience of working in a FISMA, SOX, or HIPPA environment. Fundamental knowledge on scripting tools such as python, java, PowerShell Knowledge of design and operations of Access Management, LDAP, Active Directory, user management, and password management Experience working with Active Directory and LDAP Knowledge of authentication, authorization, provisioning, deprovisioning, OTP and multi-factor authentication, password policies, role-based authentication, single sign EDUCATION A bachelors degree in computer science and/or Information Technology; relevant work experience (over eight years) may be acceptable. LENGTH OF EXPERIENCE The minimum amount of total on-the-job experience required is twelve (8) years, for the position. This means experience in a related area or time spent performing similar work that provides the background for the current position. Thanks for your valuable time!!! Best Regards, Kevin Smith: [email protected] Keywords: access management information technology Immediate Interview :: Identity Access Management (IAM) Administrator :: Washington, DC Hybrid 3 days Onsite [email protected] |
[email protected] View all |
Tue Jul 16 18:56:00 UTC 2024 |