The point where experts and best companies meet
Share
Role Description:
The individual in this role will participate and lead technology teams that research, engineer, develop, implement, communicate, monitor, and maintain the information security (authentication, perimeter security, security & compliance tools, etc.) and security policies / procedures. You will utilize your in-depth technical and product knowledge as well as experience defining new business requirements to influence design and ensure secure solutions that meet the organization’s needs.
Responsibilities:
Subject Matter Expert for the products, solutions and capabilities that comprise our capability model
Provide technical guidance on solution delivery as well as assist other on-going engagements for resolving critical issues
Lead design and implementation of complex enhancements or On-board / integrate new applications effort
Work with technology vendors as appropriate to resolve product issues, technology evaluations, and design reviews
Capture and translate new requirements into operational and engineering goals
Participate in continuous improvement initiatives, identify ways to improve delivery to increase efficiencies
Meet demands of managing multiple work streams, communicating effectively with senior technology and business leadership, and demonstrate experience leading large and complex projects and global programs.
Assess and advise project management implications throughout projects' timelines, including development of strategies, readiness assessment, development of training and communications.
Articulate technical and business issues and solutions effectively to business or technical staff across organizational layers
Required Qualifications:
5+ years’ experience driving complex projects and programs.
Strong communications, interpersonal and influencing skills
Excellent organizational skills, able to manage multiple work streams simultaneously and respond to rapidly changing demands
Experience working with frequently-utilized IAM vendor solutions such as SailPoint, ForgeRock, Ping, Okta, Varonis, CyberArk and Hashicorp in large enterprises
Knowledge of cloud platforms (AWS, Azure, GCP etc.) experience in deploying and managing AM solutions on cloud platforms. AWS is preferred
Desired Qualifications:
Broad technical knowledge of IAM lifecycle, ecosystem and enterprise products
Experience in the deployment of Single Sign-on, attribute-based access control, proxy based application, and strong authentication using access management products
Hands-on experience with IAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts
Strong technical knowledge of authentication and authorization protocols: OIDC, SAML, XACML, LDAP, OAuth, OpenID
Experience working with privileged access and secrets management products such as CyberArk and HashiCorp
This job will be open and accepting applications for a minimum of seven days from the date it was posted
These jobs might be a good fit