Urgent Requirement - IAM Security Architect - Hybrid - Racine WI at Racine, Wisconsin, USA |
Email: [email protected] |
From: Ben, Spar Info Sys [email protected] Reply to: [email protected] Job Title: IAM Security Architect Location : Hybrid - Racine WI ( Once in a week or 1 week in a month ) . Duration: Long Term Open to C2C REQUIRED EDUCATION: Bachelors Degree in any field TOP 5 REQUIRED ATTRIBUTES: A minimum of 5 years of experience in identity security with expertise in Microsoft Entra/Azure AD solutions, Active Directory and PAM solutions like CyberArk Demonstrated experience in deploying IGA solutions with a preference to Saviynt Strong knowledge of security architecture, design patterns, and best practices in hybrid environments Proficient in cybersecurity best practices and threat mitigation strategies Excellent communication skills to articulate complex security concepts to technical and non-technical stakeholders TECHNOLOGY PROFICIENCIES: Microsoft Azure AD/Microsoft Entra IGA (Identity Governance Administration Tool) (Preferred Saviynt) KEY WORDS: Identity Governance IGA Cyber Security Privileged Access Management LOCATION: 25% onsite in Racine HOURS: 40/week 8:00 5:00 PM (with flexibility due to collaboration with global teams) INTERVIEW FORMAT: 1 Panel Interview/Video CONVERSION PLANNING: No Conversion planning, but this contractor will be visible to other teams and possible opportunities within client. This role will assist the security architecture leader in ensuring the secure design, implementation of IAM solutions both on-prem and in cloud environments. The successful candidate will collaborate with engineering teams to provide expert guidance on security best practices, develop security standards and design patterns in IAM domain, and conduct thorough technical security assessments to uphold the confidentiality, integrity, and availability of our applications and data. Project or Solution Security Consulting Responsibilities Collaborate with cross-functional teams to understand business requirements and provide security recommendations in both IT and business led initiatives Conduct security design reviews for proposed solutions, identifying and addressing potential vulnerabilities and threats Document formal project artifacts business requirements, high-level architecture and design documentation, low-level architecture and design documentation Consult solution team on vulnerability and penetration test assessment findings Provide general security support and consulting throughout the engagement Security Governance Responsibilities Develop, enhance, and maintain security standards, policies, and procedures for IAM, ensuring alignment with best practices and regulatory requirements, Create and update security design patterns for various business scenarios in the identity space, ensuring consistent and effective security practices across projects Utilize the NIST CSF, CIS, CSA CCM to guide and enhance company security posture General Responsibilities Collaborate with the wider security team to support response and remediation of security incidents, as well as proactively identify potential security risks Apply threat modeling frameworks (e.g., STRIDE, PASTA, MITRE ATT&CK) to assess and address security threats and vulnerabilities for new and existing applications and services Provide technical and project leadership for IT security solutions Full cycle engagement and leadership - analysis, requirements development, solution request-for-proposal (RFP) support, design, documentation, implementation, operationalization, and maintenance Definition of control effectiveness metrics and establishment of on-going visibility and reporting Integration into product-related lifecycle activities Development of operational plan for transition of the security solution to run Actively participate in team scrum activities in a hybrid productized and projectized environment Properly document and manage scrum stories from sprint to sprint, ensuring timely updates Provide input for development of domain/product-related roadmaps, tactical execution plans with SMART OKRs (objectives and key results), and assist in related activities (e.g. current state documentation, gap analysis, resource estimations) Focus on self-service, automation opportunities and quality of supporting documentation Keywords: active directory information technology Wisconsin |
[email protected] View all |
Fri Dec 08 00:15:00 UTC 2023 |