Identity and Access Management (IAM) Design Analyst

Location: Houston, TX, United States
Date Posted: 06-14-2018
We have an opportunity for an Identity and Access management (IAM) Design Analyst. The team is responsible for identity and access management technology design and implementation for a global corporation.  As a team member, you will use your infrastructure experience and cybersecurity knowledge to serve as subject matter expert and project consultant to improve or introduce new cybersecurity capabilities that protect a global enterprise from external and internal cybersecurity threats.

This role designs solutions for various authentication and authorization directories that result in enabling better security, higher compliance, secure partner collaboration, and provides critical foundational capabilities to enable the cloud for the corporation.

Responsibilities:
  • Leads and collaborates with architects and leaders in other IT function disciplines to develop identity based access solutions.
  • Develops and implements processes to maintain the reliability, security and efficiency of IAM asset components across the enterprise.
  • Collaborates with the Enterprise Security Operations team to ensure successful transition of new technologies to operations.
  • Responsible for establishing global IT standards for Windows Active Directory, Azure Active Directory, RSA Aveksa platform.
  • Processes and on-going enhancements and new capabilities in alignment with Security ALCM Plans.
  • Provides consulting and L3 support for IAM technologies. 
Technical IT Infrastructure Knowledge and experience: 
  • Microsoft Active Directory,
  • Azure Active Directory,
  • Enterprise Directory,
  • Virtual Directory,
  • Federation Protocols,
  • Windows,
  • DNS, DHCP,
  • Linux-UNIX.  
Domain knowledge and experience required:
  • Knowledge and experience with Identity and Access management principles and systems on an enterprise scale.
  • Virtual Directories
  • Federated systems
  • Gateway technologies and other security and access technologies.
  • Knowledge of how to apply these technologies across security zones, domains and forests.
Leadership:
  • Demonstrated ability to conduct stakeholder engagements, gather requirements and translate to functional and design specifications.
  • Problem Solving and ability to accomplish desired results independently with minimal direction in alignment with team goals and security standards
 Special Considerations:
  • Occasional after hours and weekend support may be required.
  • Required to be on-call cycle.
For more information, please apply below or contact us
 
this job portal is powered by CATS