Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Identity and Access Management Senior Security Engineer

Job Title: Identity and Access Management Senior Security Engineer
Contract Type: Permanent
Location: North America,Virginia
Industry:
Salary: £64151.16 - £99142.71 per annum + benefits
Start Date: ASAP
REF: AGAF40_45228
Contact Name: Ana Gaffney
Contact Email: anag@montash.com
Job Published: about 3 years ago

Job Description

Montash are currently working with an American telecoms organisation who are looking to bring a Senior Security Engineer (Identity and Access Management) to join a small team within the IAM function. This individual will be responsible for the IAM function of the organisation. The candidate must be able to adapt in a fast-paced, ever changing environment.

Responsibilities:

  • Providing support for Identity and Access Management operations 24/7, on a shift rotation.
  • Knowledge of IAM best practice and policies.
  • Supporting the security design and implementation of IAM and make any necessary updates to improve the systems.
  • Providing support for different IAM tools including LDAP, SiteMinder, Ping Federate and provide operational support for 2 factor authentication technologies.
  • Maintain comprehensive documentation regarding IAM configurations, operating procedures, and service records relating to IAM hardware and software.
  • Experience in using different Identity Synchronization/Bridging systems between legacy IAM systems and Cloud (SCIM Provisioning)
  • Provide support for IAM incidents including violations, attacks, and malware.
  • Support the security design and implementation of new projects and systems.
  • Research new technologies and IAM methodologies.
  • Hardening Windows, Linux, and Solaris systems, with a focus on security related topics such as system hardening, configuring/installing access controls, monitoring, and host-based intrusion detection and forensics techniques.

Skills Required:

  • Experience in the following: LDAP, CA SiteMinder, SSO (Ping Federate)
  • Scripting the following: Linux, Unix, Java, C++
  • Cryptography and PKI is beneficial.
  • College degree in Computer Science/ Information Security or equivalent.
  • Must be able to liaise with different business units and high level executives of the organisation.
  • Security certifications such as CISSP, CISM, CISA, all other certifications are a advantageous.
  • Hard worker and highly adaptable to an ever changing environment.
  • Passion for the IT and IAM space.

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...