hireejobs
Hyderabad Jobs
Banglore Jobs
Chennai Jobs
Delhi Jobs
Ahmedabad Jobs
Mumbai Jobs
Pune Jobs
Vijayawada Jobs
Gurgaon Jobs
Noida Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

Identity & Access Management Consultant

4.00 to 7.00 Years   Pune   23 Sep, 2019
Job LocationPune
EducationNot Mentioned
SalaryNot Disclosed
IndustryBanking / Financial Services
Functional AreaGeneral / Operations Management
EmploymentTypeFull-time

Job Description

Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, HPNSK/Tandem, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures.What Part Will You Play Provides expertise and advice as a Subject Matter Expert (SME) for access administration and troubleshooting of Identity and Access Management (IAM) tools, applications and assigned technologies. This ensures appropriate access and meets internal/external data security requirements.Reviews maintenance reports and violation logs to detect and employ solutions that deter existing and future unauthorized access that may be a threat to corporate, client, and team member security; designs controls to mitigate future threats.Uses a comprehensive understanding of multiple IAM, operational and security technologies, to lead the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.Creates, maintains, reviews and approves new relevant documentation to include, but not limited to, Standard Operating Procedures, project change control methodologies, and architectural diagrams. Provides adequate support and processes for maintaining the confidentiality, integrity and availability of critical security systems.What Are We Looking For in This Role Minimum QualificationsBachelors DegreeRelevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experienceTypically Minimum 8+ Years Relevant ExpResponsible for the implementation, security, maintenance and access administration of information security managed technologiesMust have the ability to pass and maintain a government level security clearancePreferred QualificationsBachelors DegreeComputer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experienceTypically Minimum 4 Years Relevant ExpExperience supporting UNIX, Windows Server, mainframe and/or HP NonStop systems. Experience with remote administration tools, basic networking concepts, Help Desk support, scripting/programming and/or logical access administration using security products (ACF2, Active Directory, LDAP, etc.).Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferredWhat Are Our Desired Skills and Capabilities Skills / Knowledge - Having broad expertise or unique knowledge, uses skills to contribute to development of company objectives and principles and to achieve goals in creative and effective ways. Barriers to entry such as technical committee review may exist at this level.Job Complexity - Works on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Creates formal networks involving coordination among groups.Supervision - Acts independently to determine methods and procedures on new or special assignments. May supervise the activities of others.Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problemsApplications and Systems - Utilizes, configures and monitors security using Identity and Access Management technologies to meet internal and external requirements for data securityProject Management - Plans, organizes, motivates and controls resources to achieve defined goals,

Keyskills :
sales marketing ertifiedinformationsecuritymanagercism certifiedinformationsecuritymanager standardoperatingprocedures

Identity & Access Management Consultant Related Jobs

© 2019 Hireejobs All Rights Reserved