Description
IMPORTANT
3 Top skills must be seen on the resume -
PAMcyber securitynetwork elements Senior intermediate role
No testing in interviews
What types of projects will this candidate be working on Cyber security projects to protect internal assets
Typical hours worked 8-5pm
Why has this position arisen? backfill
New requirements ? Any potential to hire Full time? Not this year
Flex hours, possible to work from remote? Yes, position should be offered to Toronto, Ottawa, Montreal
Your main role will be to determine, evaluate, test and support the implementation of key security controls for Identity and Access Management requirements throughout the Network organization, especially with Privileged Access Management solutions. You’ll be involved in technical discussions and decisions with senior security architects and asset owners. An agile and incremental approach is essential to deliver flawlessly this security environment.
Candidates must be self motivated, open minded and a passion for creativity. The successful candidate will partner closely with other security architects and specialist internally.
Your responsibilities:
Determine, evaluate, test and support the implementation of key security controls and for IAM and PAMSupport the Sr Security Architects in IAM solution designs and architecturesSupport Technical Analysts in the implementation of PAM solutions on internal assets, which includes the implementation, configuration, coordination, control, maintenance, troubleshooting, testing, usage monitoring and the development of systems infrastructureSupport Business Analysts in server to application mapping, privileged account mapping, presentation to stakeholders, demo and training activitiesUnderstand and improve the internal security operational processes with the introduction of new security controlsSupervise the development and implementation of new technological approaches, services and methods and analyze the resulting impact on security postureEssential skills:
5+ years of cyber security experience, including 2+ years of experience in design, implementation, and support of various Identity and/or Access Management (IAM) solutionsDemonstrated experience with Linux/Unix, Windows, scripting (REST API, Bash, PowerShell, Ansible), SQL, LDAP, and web servicesDemonstrated experience troubleshooting, managing, and solving issues related to identities, systems, access, accounts, authentication, authorization, entitlements, and permissionsExperience in some of the following: user provisioning, entitlement review and certification, enterprise directory architecture and design, role-based access control, single sign on, identity federation, multi-factor authenticationExperience with Network Element IAM and PAM controls (Firewalls, Routers, Switches, Wireless access points, Load Balancers, DDOS)Experience with Database IAM and PAM controls (Oracle, SQL Server, MongoDB, MariaDB, Cassandra, MySQL)Experience with cloud credential/secret management solutions such as Conjur and/or HashicorpDemonstrates knowledge of software development life cycle, DevOps, modeling of business processes, application design patterns, business/functional documents.Demonstrates knowledge of infrastructure subcomponents and interoperability.Experience with break glass solutions and implementations.Experience with Privileged Access Management solutions such as Cyberark or ThycoticHigh tolerance to ambiguity and ability to adapt in a fast-evolving environmentAbility to manage time and priorities across multiple projects and dutiesExcellent synthesis and analysis capacityBilingual (French and English) an asset