Role: IAM Consultant Location: Rochester, NY Duration: Fulltime JD: Responsibilities: NetIQ The Identity and Access Management (IAM) Architect/Consultant will serve as the technical Hands-on expert responsible for design & implementation of application and enterprise platforms within the Authentication and identity lifecycle space. The ideal candidate will be able to help design, monitor and maintain an excellent Privileged Access Management solution. The ideal candidate will manage standards for overall organization''s application integration, middleware interfaces and architecture. Lead the collection of business requirements and the design / development of Privileged Access Management (PAM) solutions (SiteMinder, SailPoint etc Responsible for architecture design, physical design and technology strategy for Privileged Access Management solutions. Should have Soft Management Skills in handling Client Stakeholders requirements. Partner with other IAM architects and initiatives and Coordinate communications with internal and external teams (Offshore Resources) is a MUST. Provides issue resolution and L4 support as required. Ensures successful transition of project deliverables to support / maintenance /operations teams Offshore teams. Should be willing to relocate /Onsite at Rochester, NY. Qualifications/Requirements: Minimum of 10-15 years experience with Privileged Access Management technologies (PAM Tools) including CA SiteMinder, SailPoint, Cyberark, BeyondTrust etc. Minimum of 3 years Project management experience leading technical initiatives. (Soft Skills with Management Stakeholders is highly desirable Solid understanding of Privileged Access Management (PAM) and security concepts. Unix/Linux server administration experience and demonstrated understanding of LDAP bridging technology. Advanced knowledge of Microsoft Active Directory authentication, Group Policy Objects, LDAP, including design, configuration and deployment. Demonstrated experience with Privileged Access Management platforms Demonstrate an understanding of Identity and Access Management business processes
Associated topics: attack, cybersecurity, forensic, identity access management, iam, phish, protect, security analyst, security engineer, vulnerability
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.
Loading some great jobs for you...