Identity and Access Management ( IAM ) Architect fully Remote Position.
Click here to unsubscribe if you no longer wish to receive our emails |
Hi
Hopeyou are doing great, I have a position for Identity and Access Management ( IAM ) Architect fully Remote below is the job description, pleaselet me know if you are comfortable to move with this position or help me withthe job title you are targeting with your compensation rate and workauthorization so that I could help you in finding a better position.
Job Title: - Identity and Access Management ( IAM) Architect
Job Location: - Fullyremote
JobDescription :
This person needs to be a Sr. levelresource who is and EXPERT with Okta.
Top Skills:
1. OktaArchitecture Experience: someone who has implemented Okta in an enterpriselevel environment from the ground up (it would be a huge plus if we have acandidate that migrated SailPoint to Okta)
2. Managing APIĆ¢s at it pertains to IAM: Execute with workflows within an APIendpoint, Create API code for plugging existing application to OktaAuthentication
3. MFA/SSO Experience
Job Description:
Anexperienced leader to provide guidance Identity and Access Management (IAM)roadmap, including implementation of RBAC and ABAC models for corporateidentities in a hybrid environment. The ideal person must be experienced indriving IAM technology changes, delivering projects, and implementing secureautomated processes that combine both cloud and on-premise resources. Must befamiliar with compliance and auditing controls required to implement corporateidentity governance on cloud based and on-premise resources. The person shouldhave hands on experience with integration on cloud environments, includingIaaS, PaaS, and SaaS services.
Ć¢¢ 15+ years of overall IAM / software development experience, solution designand technical architecture experience. 10+ years of driving applicationarchitecture design
Ć¢¢ Implementing, integrating and supporting Okta's cloud technologies intoClient's IAM environment.
Ć¢¢ Build, design test workflows, including connecting applications, import andedit data in a table, set schedule options
Ć¢¢ Execute workflows with API endpoint, save date with flow history and repairan invalid flow
Ć¢¢ Design time- and context-based identity entitlement, build automation tocatch identity conflicts and lifecycle activity
Ć¢¢ Create API code for plugging existing application to Okta authentication
Ć¢¢ Design Portal Identity management with Okta, Integrate and federateauthentication with 3rd party portals
Ć¢¢ Design Dynamic access grants, granular link between identities andentitlements to be able to tell who has access to what and who is responsiblefor maintaining an entitlement.
Ć¢¢ Design frequent delta scans for changes since last scan, besides full scan,to support existing SLAs for new user on-boarding, role changes andterminations.
Ć¢¢ Design dashboards for various KPIs for slicing and dicing of information onidentities, accounts, roles, entitlements, associations, assignments, identityevents
Ć¢¢ Design and drive the implementation of regular user access reviews,attestation, and certification processes.
Ć¢¢ Design delegation of access governance for specific catalogs to non-IT adminsand Implement industry standard IAM and IGA concepts including least privilegeand separation of duties for session management, password management,permission management, and entitlement management.
Ć¢¢ Orchestrating tasks to enable functions such as access approvals,notifications, escalations, manual fulfillment requests and integration withother business processes to allow managers or resource owners to approve ordeny requests.
Ć¢¢ Design security policy rules and constraints that govern automatic assignment(and removal) of entitlements
Ć¢¢ Design oversight (self or Line of Business ownerĆ¢s) to ensure that usersdonĆ¢t keep access when they no longer need it.
Ć¢¢ Evaluating the current state of identities and entitlements against businessrules and controls, providing a means for alerting control owners of exceptions(such as changes made directly on target systems) and allowing for orderlyremediation
Ć¢¢ Design and configure risk scoring for entitlements and evaluate risk based onidentityĆ¢s assigned roles and access to resources and report the risk forproactive policy violation detection.
Ć¢¢ Automate the cleanup of excessive and unnecessary entitlements for policyenforcement.
Ć¢¢ Experience with SCIM connectors, Okta Workflows, Azuqua
Ć¢¢ Enhance the continuous process of identity governance by risk reporting, rolemining and engineering
Ć¢¢ Experience in how legacy and web-based systems interfaces, ApplicationProgrammable Interfaces (APIs).
Ć¢¢ Demonstrated knowledge of Systems Development Life Cycle (SDLC) methodologyand coding methods/best practices
Ć¢¢ Strong knowledge of LDAP, Active Directory, SAML, SPML, SSO, RBAC
Ć¢¢ Strong knowledge of web protocols XML, SOAP, JSON, REST
Ć¢¢ Knowledge of software development security and cryptography.
Ć¢¢ Experience with MFA, SSO, Kerberos, SAML, OIDC, OAuth, Privileged AccessManagement (PAM)
Ć¢¢ Knowledge of Java EE, Ruby, Java, C, ksh/bash shell scripts, Python or Perland other development frameworks.
Ć¢¢ CSP technical certifications (Azure, AWS, GCP)Ć¢
Theclient needs need the following for each candidate in order tosubmit;
- Updated resume
- LinkedIn profile URL for candidate
- DOB (month/day only)
- Rate
- 2 managerial or team lead references. These references must have LinkedIn accounts and I need the URLs to them.
Regards,
Niket Kumar
Logic Planet Inc
4525Route 27,Princeton, NJ08540.
Desk Ph: 732-512-0009 Ext: 408
Email: niket.kumar@logicplanet.com | www.logicplanet.com
Linkdin: https://www.linkedin.com/in/nikzun/
------------------------------------------------------------------------------------------
19 years in IT. 400 employees. $40Min revenues
------------------------------------------------------------------------------------------
This email is generated using CONREP software. |
A10101
Comments
Post a Comment
Thanks