Jobseeker Register

Submit Resume - satitjobs.com

Jobseeker Login

Create Resume Online

Submit Your Link in mlinkdirectory.com for free and increase your visibility.

Recent Job Search
csc, india, pvt, ltd
coder
pvcs, jobs, in, shillong
prudential
sap, sem, jobs, in, guntur



 
Jobs Posted by Arshadconsultancy
US citizens IAM, SAP Salesforce,
Company Name: Arshadconsultancy | Posted On: 12/30/1899

Identity & Access Management Security Consultants and Manager First skill would be Oracle Oracle ID Manager Oracle IAM - Identity & Access Management Second skill is Tivoli Third is CA Fourth is Sailpoint Any combo of the above is better but our meat and spuds if you will is Oracle IAM Consultant level. US CITIZEN EAD tied to Green Card process Green Card Open to 80% travel Open to perm roles Identity & Access Management Security Consultants and Manager b6 Organization: Technology Growth Platform Location: Location Negotiable Travel: 100% (Monday - Friday) Choose * for a security technology career where the variety of opportunities and challenges allows you to make a difference every day. A place where you can develop your potential and grow professionally, working alongside talented colleagues. The only place where you can learn from our unrivalled experience, while helping our global clients achieve high performance. If this is your idea of a typical working day, then * is where you should be. * `s Security practice helps organizations work through complex business and technology issues to provide a straightforward approach to information security. Our security professionals bring deep technology skills and industry knowledge to any organization and work closely with clients to design and implement a security solution closely tied to business objectives. Identity & Access Management Security Consultant: Our consultants identify and evaluate security gaps and will help to create security project plans. They also anticipate security requirements and identify sound security controls for applications, systems, processes and organizations. Our consultants can easily work with non-security teams to integrate security controls on projects. We are currently searching for consultants for our Security Technology practice who are familiar with multiple Identity & Access Management products, including Oracle, CA, Sun, Tivoli, SiteMinder and others. Technical experience should include design and developing provisioning flows and adapters for assets, developing Role Based Access Control (RBAC) entitlements to web applications, implementing role resolution, role mining and role administration user interfaces. Key responsibilities may include: Working with clients to develop Identity and Access Management strategies, architectures, and implementation plans Configuration and Implementation of I&AM products and risk mitigation Design and develop automated provisioning and reconciliation of IT resources Request-based application and resource provisioning RBAC authentication to entitled applications and resources Role based resolution of approvers for request approval flows Single Sign-on Ability to travel 100% Basic Qualifications: Minimum of a Bachelor degree Minimum of 2 years experience working in one of the following areas: Application Security; PKI & Authentication; Identity & Access Management or Data Privacy & Security Minimum of 2 year experience in the consulting environment Minimum of 2 years experience with packaged or custom IAM solutions. Preferred Skills: Industry-adopted security certification (e.g. CISSP) Minimum of a Bachelor degree in a technical field (e.g. Computer Science, CIS,MIS, Engineering) Experience deploying and implementing custom applications Experience with any of the following: o Provisioning Onboarding o RBAC Authorization models o SSO WAC technologies Enterprise SSO o Federation o Directory Services Meta-Directory Virtual Directory Experience with any of the following Security areas: o Information risk, privacy, and strategy (i.e. security and privacy policies, or risk assessments, or security and privacy compliance); o Application security; (i.e. application security testing or security integrations with Systems Development Lifecycle (SDL) ) o Infrastructure security; (i.e.- securing networks and servers or security monitoring) o Identity and access management; (i.e. authentication methods, or provisioning, or entitlement management) o Data security or encryption
Sitemap
buy original Murano glass online venetian glass vase on mademuranoglass.com shop online with factory prices.