Wednesday 17 April 2024

IAM Lead Architect Jersey City, NJ or Tampa FL, or Dallas, TX USC, GC,

HY

I hope you are doing well.

I am hiring a consultant for one of my client's requirements. I've written the Job Description for the same below. If you find yourself comfortable with the requirement please reply back with your updated resume.

 Position:  IAM Lead Architect 

 

 

Location: Jersey City, NJ or Tampa FL, or Dallas, TX

 

Duration: 12 MONTHS

 

Visa: USC, GC,

 

 

Hybrid – 3 Days onsite

 

 

 

 

Client Detail (What does the company do? Recent history? Website? Parent Company? Size of Company?)

 

Our client is a financial services company that provides clearing, settlement, custody, and risk management services for securities transactions

 

Job Order (Why might someone want to work here?)

 

Position Summary

The primary focus areas for this position are the following:

• Produce security architecture deliverables as part of initiatives related to certificate services and identity and access management

• Partner with IT teams to design and deliver architectures to enable federated access and single sign on in cloud and hybrid environments

• Proactively identify security gaps, propose solutions, and follow through with engineering teams for implementation

• Innovate and lead others to solve complex issues

Your Responsibilities

• Drive the Identity & Access Management and secrets management architecture roadmap and share with AES stakeholders

• Participate in discovery workshops to understand client's & Workforce IAM and security needs and provide best practice recommendations to meet IAM use cases. Develop design and architectural diagrams that clearly communicate the proposed solution and flows

• Actively participate in the cross-functional team meeting, developing project plans, implementation, testing, pre / post go-live activities, risk management and issue management.

• Architect solutions utilizing Ping Identity Products, PlainID and similar IAM products, such as IGA tools, Virtual Directory, PAM and Secret Management solutions.

• Create IT security standards easily consumed by stakeholders. Evaluate the existing application security controls, (on-premise and cloud), identify improvements, and build plans into the application security capability roadmap for implementation

• Build access management security patterns (standardizing authentication/authorization flows, single-sign-on/MFA, provisioning, user behavior analytics, access governance system controls, privileged/secrets mgt) and designs as part of initiatives to modernize the DTCC access management security posture

• Mentor junior security engineers and architects to enhance their cybersecurity and architecture skills

• Maintain professional and technical process knowledge by keeping abreast of the changing security landscape within the technology industry and changes in cybersecurity frameworks

• Create white papers and present in industry conferences to display thought leadership in the security field

• Align risk and control processes into day-to-day responsibilities to monitor and mitigate risk; escalates appropriately

Leadership Competencies for this level include

• Feedback: Seeks feedback from others, provides feedback to others in support of their development, and is open and honest while dealing constructively with criticism.

• Delegating: Effectively manages tasks and people, taking a practical approach to determine the most effective method of execution while respecting others' expertise and considering others' feelings and working styles.

• Inclusive Leadership: Values individuals and embraces diversity by integrating differences and promoting diversity and inclusion across teams and functions.

• Coaching: Understands and anticipates people's needs, skills, and abilities, in order to coach, motivate and empower them for success.

Qualifications

• 8-10 years of related experience

• Bachelor's degree preferred

Specific Skills & Technologies

• Strong cybersecurity experience in architecting implementations using Ping Identity products (especially PingFed, PingOne, PingID, and PingAuthorize) is required.

• Experience with most standard IAM security protocols (Eg: OAuth, OIDC, RACF, SAML, LDAP, ID Federation, SSO, MFA, UEBA) is required.

• Experience architecting solution using products like API Gateway, IGA and Virtual Directory is required.

• Strong experience in identifying access management control gaps

• Experience with Information Security frameworks (e.g., ISO 27001, CIS, MITRE ATT&K and NIST) & security architecture frameworks

• Experience architecting automated data centre processes, including provisioning, application, and patch management, monitoring and alerting, capacity monitoring and planning, leveraging execution and human approval workflow design and implementation

• Experience in OS security (Windows, Linux), Network security (Firewall, Proxy, WAF) and RDMS is preferred

• Strong communication skills with the ability to present in front of large audience

 

 

Kind Regards

Gaurav Pandey | Absolute IT | Recruitment Manager

116 • Village Blvd • Suite 200 • Princeton • New Jersey • 08540

 

gaurav@absoluting.com

www.absoluting.com

 

 

No comments:

Post a Comment