IAM Security Architect Information Technology (IT) - Chicago, IL at Geebo

IAM Security Architect

IAM Security Architect - Prefer someone who has CyberArk or NetIQ

Can be located in Lake Forest, IL or Chicago IL

Prestigious Organization is seeking an IAM Security Architect with preferably CyberArk and NetIQ experience but will look at someone strong with either technology. This individual is responsible for design and development of new security solutions, Tier III Support, SDLC, product life cycle, forensics and investigations, IT & Application penetration testing, documentation, and RCA's. The individual will facilitate and gather requirements from our customers and provide security solutions to meet their needs while aligning with Company strategies, policies, standards, guidelines, and procedures.


Responsibilities:

  • Provide Expert access troubleshooting and production support as needed in all systems across the enterprise especially related to Active Directory, IAM, Privileged ID Management, and SAML technologies
  • Anticipate customer needs and proactively identify solutions
  • Identify and lead large and complex Continuous Improvement projects seeking opportunities to more effectively address team processes and customer needs. Guide team members on less complex Continuous Improvement Opportunities.
  • Demonstrates an advanced understanding of troubleshooting and configuring Drivers, Privileged ID Management, and SAML SSO integrations.
  • Has an advanced understanding of enterprise workflows enabling them to perform advanced troubleshooting and create advanced workflows.
  • Building, releasing and importing Identity Access related changes.
  • Lead large projects, manage and train team members assigned to projects, with little to no direction.
  • Coaching and serving as a technical escalation resource to team members and groups in or outside the department on all Identity Access related technical issues.
  • Understanding of Cloud solution best practices and integration techniques
  • Researches, evaluates, designs, tests, recommends and plans the implementation of new or updated information security technologies
  • Lead security project implementation from conception, design, testing and implementation.

Education:

  • BA/BS or equivalent preferred
  • 7-10 years of experience in related field preferred.
  • Bachelor's degree in Information Systems or related degree, or equivalent job experience.


Experience:

  • 7
    years of experience or training in Identity systems security fundamentals design, implementation and troubleshooting across all computer platforms.
  • 7 or more years required of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments.
  • Expert understanding of Identity technologies and understanding of integration of applications within a distributed environment
  • Expert understanding of certificate based authentication and certificate management (eg SSL and PKI)
  • Expert understanding of position based security model within the HR Org and distribution throughout the enterprise
  • Experience in implementation and management of security access systems within the enterprise and in the cloud (eg Federation, SAML, etc.)
  • Demonstrates an expert understanding of how security access systems integrate across the enterprise
  • Any of the following are highly preferred:
    CISSP, CRISC, CISM or CCIE Security
  • Knowledge and ability to teach/mentor an Engineer II provides regular knowledge transfer to team members
  • Experienced in leading large security access system upgrades/projects
  • Ability to add/change and provision roles and tasks in an IAM environment via standard business applications.
  • Demonstrates an advanced understanding of how an IDA system integrates with SAP.
  • Experience writing, executing and troubleshooting advanced Power Shell Scripts.
  • Has an advanced understanding of an IAM environment and related technologies, including Active Directory and SAP
  • Ability to troubleshoot user account and directory object issues throughout the IAM environment including Privileged ID Management, Active Directory, and SAML environment.
  • Demonstrates an advanced understanding of troubleshooting and configuring the IAM landscape including Privileged ID Management and SAMIL SSO integrations.
  • Has an advanced understanding of enterprise workflows enabling them to perform basic troubleshooting and create basic workflows.
  • Very strong analytical and problem-solving skills

Work Environment:

  • Minimal travel required. There may be the need to travel between domestic and international Company and supplier locations

Impact:

Describe types of the decision made by this job

  • Architectural and engineering decisions based on security best practice, Company Policy and strategy.
  • Guidance on security vendor selection.
  • Responsible for continuous improvement in driving process efficiency.

Describe the impact this job and the decisions it makes has on the organization.

  • Void this role, Company's business IT systems and reputation would be at material risk
  • Ensures compliance with mandatory regulatory requirements at a Global level
  • Ensures productivity of Company global team members by designing/developing solutions that enable business functions/services to operate seamlessly and scale appropriately
  • Providing 24x7x365 capabilities.
  • Provides competitive advantage by helping to maintain the Company Global brand across multiple platforms and new technologies.
  • Key Stakeholder in implementing security technology solutions that enable business productivity.

Working Relationships:

  • Reports directly to Supervisor, Enterprise Security Administration
  • Daily interactions with Infrastructure Engineering, Security Risk and Compliance, Security Administration, Security Operations, Business Continuity, and other business units
  • Close working relationships with all areas across Enterprise Systems and Processes
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.