Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

SailPoint Consultant

Job Title: SailPoint Consultant
Contract Type: Contract
Location: Basingstoke, Hampshire
Industry:
Salary: £600 - £700 per day
Start Date: ASAP
Duration: 3 months +
REF: SailP170615
Contact Name: Amy Harris
Contact Email: amyh@montash.com
Job Published: over 2 years ago

Job Description

You will be working on a large IAM program where the aim will to bering IAM process automation and best practice within the organisation.

You will be required to

  • Implement SailPoint IdentityIQ connectors, custom rules, workflows and business processes and Implement Recertification process in Sailpoint IdentityIQ.
  • Design, implement and deploy code and execute build processes
  • Liaise with a number of IT and business stakeholders to gather requirements and to conduct design workshops
  • Integration with external applications including configuring both Out of the box and custom connectors development.
  • Report creation, Rules development and External Applications Aggregations.
  • Build and Support Application Connectors from IIQ to Various Endpoint Application repositories such as LDAP,AD, JDBC relational Databases, Applications from CA, Oracle, Salesforce etc
  • Work with post implementation for user testing, debugging, support and maintenance
  • Participate in Identity and Access Management security initiatives

Required Experience

  • 2-3 years experience in Sailpoint IdentityIQ- Configuration and coding, workflows, connectors, integration, custom forms
  • IIQ application connector development using IIQ Specific Java bean shell coding
  • Sailpoint reporting and task development
  • Good knowledge of existing SailPoint API's and implementation experience
  • Knowledge of SailPoint access certification process
  • Good knowledge of IT Security (5 years minimum)
  • XML, SPML, SOAP, REST, HTML, Web and application Servers

Highly desirable

  • Exposure to Cyber Ark, Centrify, SSO Solutions

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...

W1siziisijiwmtcvmdkvmtgvmtavmtivndyvodeyl1dvbwvuigluihrly2ggkdiplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Tech is for girls... and always has been!

2017-09-18 10:00:00 +0100

Today, it's hard to deny that the IT and tech industry is a male-dominated field. Women earn only 28%[1] of computer science degrees, while the quit rate for women in the high tech industry is 41%[2], twice as high as it is for men. These two statistics would suggest that perhaps women aren't just discouraged from entering the tech field, but may find it a challenging environment to work in both in terms of treatment and pay. Facebook chief operating of...