New Positions || Remote ( Preferred - Atlanta/Raleigh/Charlotte) at Remote, Remote, USA |
Email: [email protected] |
Classification: Public Hi All, Pls submit profiles in the below roles asap. Mention the role while submitting. LinkedIn Profile link , Education details, Contact number has to be on Resume : Location: Remote ( Preferred - Atlanta/Raleigh/Charlotte) Contract Role Role Name JD Rate R1 Federation Technical Lead Working knowledge of Active Directory Working knowledge Azure Enterprise Apps Working knowledge of SAML, OpenID Connect, Oauth Some familiarity with AWS Experience with Service Now Experience with CyberArk PV/CPM Collaboration skills Team coordination skills 50 R2 Federation Engineer Working knowledge of Active Directory Working knowledge Azure Enterprise Apps Working knowledge of SAML, OpenID Connect, Oauth Some familiarity with AWS Experience with Service Now Experience with CyberArk PV/CPM Collaboration skills Team coordination skills 50 R3 Federation Engineer Working knowledge of Active Directory Working knowledge Azure Enterprise Apps Working knowledge of SAML, OpenID Connect, Oauth Some familiarity with AWS Experience with Service Now Experience with CyberArk PV/CPM Collaboration skills Team coordination skills 50 R4 Federation PM & Lead Analyst Base protocol knowledge: LDAP, HTTP(s), etc. Infrastructure knowledge set Application structure/data flow Front end/back end SQL/DB access Data Lake access Application knowledge SaaS functionality How a SaaS would transition to Federation API functionality base understanding Active Directory User/Group mechanics RBAC (role-based access control) Azure AD/Entra ID Federation types (Service Provider initiated vs. Identity Provider initiated) Considerations for usage of SAML 2 vs OIDC/OAuth Enterprise applications Conditional access policies SCIM (capabilities) Sync between on-prem and cloud (basics, time to complete) CMDB Export/sort/filter applications based on multiple criteria PM Excel/PowerPoint heavy Pivot charts/tables Scheduling for meetings w/engineers/app team/vendors Working knowledge Azure Enterprise Apps Working knowledge of SAML, OpenID Connect, Oauth Some familiarity with AWS Experience with Service Now Experience with CyberArk PV/CPM Collaboration skills Team coordination skills 52 R5 Business Analyst Gather and analyze federation & MFA data Create reports, dashboards and visualizations Write clear and well-structured requirements Coordinate federation activities with different teams and vendors Communicate and validate federation and MFA requirements with relevant stakeholders 50 R6 Change Coordinator Facilitate the Federation change management activities and processes Support the design, development, delivery and management of change management plans & schedules Monitor and evaluate change progress and effectiveness Support the development, delivery and management of change communications 50 R7 Azure Engineer Technical point of escalation to the Engineering team; resolving client issues, working in collaboration with partners across the business Experience with Azure cloud services including Azure AD, conditional access policies, MFA, Role based access control, logging and monitoring Possess strong Windows Active Directory background. Administer users and groups in Azure AD and assign RBAC Familiarity with Azure Ad connect and sync users and groups from on-prem AD Have experience with automation and PowerShell scripting Strong knowledge of LDAP and Kerberos Experience with ADFS, Azure AD Federation, SSO and modern authentication products such as SAML, Oauth/OIDC, WS-Fed Experience with M365 / office 365, including Teams, SharePoint Online, OneDrive and Exchange online. Familiarity with SNOW, Change control tasks and execution 50 R8 IAM Architect Base protocol knowledge: LDAP, HTTP(s), etc. Infrastructure knowledge set Application structure/data flow Front end/back end SQL/DB access Data Lake access Application knowledge SaaS functionality How a SaaS would transition to Federation API functionality base understanding Active Directory User/Group mechanics RBAC (role-based access control) Azure AD/Entra ID Federation types (Service Provider initiated vs. Identity Provider initiated) Considerations for usage of SAML 2 vs OIDC/OAuth Enterprise applications Conditional access policies SCIM (capabilities) Sync between on-prem and cloud (basics, time to complete) CMDB Export/sort/filter applications based on multiple criteria 52 R9 Active Directory UPN Engineer Subject Matter Expert with at least 10 years of experience on Microsoft Active Directory Experience with Active Directory forests and trusts Deep knowledge of Azure Active Directory/Entra ID Synchronization (e.g. dependencies on UPN, Alternate ID sync method, etc.) Experience with Group Policy Objects (GPO), DHCP, DNS Strong PowerShell scripting experience Experience with UPN prefix and suffix changes Bulk UPN change rollout - change UPNs for individual users. Prepare documentation about known issues and workarounds Coordinate with stakeholders for SaaS and Line of Business (LoB) apps issues caused by UPN changes Managed devices issues including Microsoft Entra joined devices/hybrid joined devices Meet/collaborate with testers to ensure the impact of UPN changes are validated Ability to troubleshoot and fix issues with UPN changes 52 R10 IAM Technial Project Coordinator Working knowledge of Active Directory Working knowledge Azure Enterprise Apps Working knowledge of SAML, OpenID Connect, Oauth Some familiarity with AWS Experience with Service Now Experience with CyberArk PV/CPM Collaboration skills Team coordination skills 50 R11 RSA Engineer Minimum 8 years of experience in Information Security, with at least 5 years on RSA SecurID/Authentication Manager 1. Deploying authentication agents, configuring authentication policies, deploying and administering RSA SecurID tokens 2. Experience with RSA SecurID Authentication API, including REST API, for Authentication Agents 3. Two-factor / On-demand authentication to various systems 4. Experience configuring internal and external (LDAP / Active Directory) Identity Sources 5. Manage Trusted Realms and user authentication across realms 6. Develop/manage Authentication Policies including Token policies, Lockout policies, Password policies, Workflow policies, and Risk Based Authentication Policies 7. Manage Security Domains/Mapping 8. Cleanup Unresolvable Users and User Groups through scheduled jobs and manual methods 9. Token Records Synchronization Between Authentication Manager and Cloud Authentication Service 10. Manage Administrative Roles & Accounts 11. Experience with Patching, configuration, and upkeep of RSA Authentication Manager 12. Service Maintenance including Monitoring & Reporting Experience in Identity & Access Management is desired. Good communication skills are mandatory. 50 R12 Data Protection Project Manager Basic Qualifications: Bachelors degree in a technology or related field is required 8+ years of experience as a technical project manager, utilizing project management methodologies and disciplines, best practices, and artifacts in both Waterfall and Agile environments Technical understanding and experience supporting projects for Data Protection Systems including any combination of the following: Governance and Oversight Data Scanning and Classification Data Protection (tokenization, masking, truncating, hashing, key and certificate management, open file share) Data Loss Prevention (inspection, blocking, alerting) Cloud access security broker Database activity monitoring Channels for the above include Endpoint reconciliation APIs Cloud AWS Cloud Azure SaaS Server (firewall audit) Proficiency and experience using Microsoft Office Suite, MS Project, SharePoint, and Clarity Proficiency and experience using Agile project management tools (e.g. Rally, Jira, MS ADS etc.) Proficiency and recent experience with regulatory and/or compliance projects Ability to travel occasionally according to client demands 3+ years of experience within the Banking or FSI industry Preferences: Technical consulting experience highly preferred PMP Certification 50 R13 Linux Remediation Engineer Basic Qualifications: Bachelors degree in a technology or related field is required 8+ years of experience as a technical project manager, utilizing project management methodologies and disciplines, best practices, and artifacts in both Waterfall and Agile environments Technical understanding and experience supporting projects for Data Protection Systems including any combination of the following: Governance and Oversight Data Scanning and Classification Data Protection (tokenization, masking, truncating, hashing, key and certificate management, open file share) Data Loss Prevention (inspection, blocking, alerting) Cloud access security broker Database activity monitoring Channels for the above include Endpoint reconciliation APIs Cloud AWS Cloud Azure SaaS Server (firewall audit) Proficiency and experience using Microsoft Office Suite, MS Project, SharePoint, and Clarity Proficiency and experience using Agile project management tools (e.g. Rally, Jira, MS ADS etc.) Proficiency and recent experience with regulatory and/or compliance projects Ability to travel occasionally according to client demands 3+ years of experience within the Banking or FSI industry Preferences: Technical consulting experience highly preferred PMP Certification 50 Thanks and Regards, Ankush Verma | Lead Recruiter Office: 732 485 0000 - 9086 Direct: 209-207-5752 Email: ankush@ cygnuspro.com Cygnus Professional Inc. https://www.linkedin.com/in/ankush-verma-7a1818b2/ Keywords: database active directory microsoft Idaho New Positions || Remote ( Preferred - Atlanta/Raleigh/Charlotte) [email protected] |
[email protected] View all |
Tue Aug 06 20:44:00 UTC 2024 |