Primary Responsibilities:
- Provide technical expertise and support for the implementation, expansion, and standardized use of Identity Governance, Access Management, and related workflows.
- Interpret business requirements to produce sound technical design Identity solutions that are scalable for the future.
- Write code to integrate in-house applications, third-party applications, and cloud applications with the Identity services platform to leverage features like automated provisioning, reconciliation, authentication, and federation.
- Work with RESTful APIs to integrate apps using modern authentication and authorization protocols.
- Design and develop workflows to route for approvals and trigger automation tasks.
- Provide operational support and guidance when required (L3).
- Write code to extend the functionalities of the IAM platform to accommodate connectors/integrations between IAM tools and system resources.
Minimum Qualifications & Experience:
- Possess in-depth technical and working knowledge in Access Management, Identity Governance, Active Directory, and Privileged Access Management implementations.
- 5+ years of experience in developing, implementing, and supporting Identity & Access Management products, capabilities, and services.
- 5+ years managing IAM tools in an engineering role. Experience with more than one of: Microsoft Active Directory, Microsoft Identity Manager, Saviynt, AzureAD, and OKTA will be highly preferred.
- Knowledge and experience with Identity Management protocols like SCIM, SAML2.0, OAuth, OIDC.
Desired Qualifications:
- Understanding of Zero Trust principles aligned to identity services and Access Management with emphasis on enforcing ‘explicit trust’ (per identity, device, and session).
- Demonstrated experiential track record in building, executing, and managing enterprise IAM initiatives in a complex organizational environment.
- Knowledge of current and emerging information technology industry trends and standards including common information security management frameworks, such as NIST, ISO, and COBIT.
- Ability to manage project activities aligned to expected and defined objectives.
- Active security certification(s): One or more of the following: CISSP, CRISC, CCSP, and/or any Identity solution or services certification.
- Experience working in global and diverse teams.
- BS degree in Computer Science, Management Information Systems, or related area of study.
ELIGIBILITY TO WORK AND E-VERIFY
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
Juniper Networks participates in the E-Verify program. E-Verify is an Internet-based system operated by the Department of Homeland Security (DHS) in partnership with the Social Security Administration (SSA) that allows participating employers to electronically verify the employment eligibility of new hires and the validity of their Social Security Numbers.
● Information for applicants about E-Verify / E-Verify Información en español:
● Immigrant and Employee Rights Section (IER) -
E-Verify® is a registered trademark of the U.S. Department of Homeland Security.