Active Directory Engineer Citizen Only -- Location: Philadelphia, PA or Dallas, TX, or Newark, NJ or Bloomfield, CT, Eden prairie, MN (No relocation) at Philadelphia, Pennsylvania, USA |
Email: [email protected] |
From: Ankit Upadhyay, Pivotal Technologies [email protected] Reply to: [email protected] Active Directory Engineer Citizen Only Client: Wells Fargo Location: Philadelphia, PA or Dallas, TX, or Newark, NJ or Bloomfield, CT, Eden prairie, MN (No relocation) Duration : 12+mth Rate: $60 Corp/Corp VISA: Citizen Must have: Azure Identity Space On prem AD to Azure AD Azure security principles Tenant consolidation knowledge - consolidation from multiple tenants to 1 tenant Migration knowledge is key here as well 1st- 30 min video interview with HM, 2nd- 1 hour video panel with team Duties: Infrastructure Sr. Engineer Directory Services Engineering & Support This position is focused on Azure identities, related technologies, and tenant migration activities. The ideal candidate is expected to demonstrate deep understanding and working knowledge of: Azure active directory Different Azure AD objects Differences between AD and Azure AD Different types of identities in Azure (local, AD mastered, Service Principals, managed identities, invited guests) Authentication path of different types of Azure users Invites guest user process and details. App registrations and underlying identities App Registration API permissions Conditional Access Policies Enterprise Apps Admin consent Enterprise Apps API permissions Different types of Azure groups (Dynamic, role-granting, local/DirSync,) AADConnect configuration, management, sync rules, and troubleshooting The candidate should have working knowledge of, and demonstrate ability and willingness to learn about Azure Graph API PowerShell reporting on AD and Azure AD objects Azure AD tenant restrictions Converting Azure invited guest user to Azure local user Converting Azure local user to ADConnect managed user Azure Hybrid AD join Active Directory: different objects, how to report on and modify via PowerShell GPO DNS LDAP protocol, access to AD via LDAP. Identity security both in AD and Azure AD General networking concepts like the OSI model and TCP/IP protocol M365 underlying identity troubleshooting and PowerShell reporting SharePoint Online and OneDrive for business Saviynt managed Azure groups Okta as an Azure identity provider Service Now as a ticketing and knowledge base platform Confluence for knowledge base and article sharing. Git and (enterprise/internal) GitHub as a repository for enterprise PowerShell automations. MIM Skills: Problem solving; ITIL Service Operations processes; ability to work independently and as part of a team; strong customer service and customer support skills with the ability to communicate difficult technical concepts clearly to a variety of individuals of varying technical expertise and understanding. Experience and extensive knowledge working with numerous Microsoft technologies such as Windows Server, Active Directory and related services. Microsoft PowerShell and/or VB.net, solid understanding of core infrastructure technologies such as DNS. Working knowledge of MIM (Microsoft Identify Manager) or FIM and prior M&A engagement are highly desired. Expertise in related areas such as Microsoft Windows, Microsoft Server, Microsoft Exchange, Microsoft Skype/Lync, Citrix Product suite, VMware Virtualization, Red Hat Enterprise Linux, LDAP and other related tools are a plus. Thanks & Regards, Ankit Upadhyay IT Recruiter Office: +1 ( 703) 570-8775 (Ext-217) Email- [email protected] Keywords: active directory information technology Connecticut Minnesota New Jersey Pennsylvania Texas |
[email protected] View all |
Wed Dec 06 01:38:00 UTC 2023 |