Description
IMPORTANT
Work from home for now
37.5hrs per week
Day to day basis and 3 top functions
Review IAM controls with asset ownersSupport PAM toolsetSupport business and technical analysts for PAM implementation3 top skills sets
PAM securityIAM security controlssecurity assessmentsQualifications - Experience in IAM and PAM support and designIdeal candidate - prior experience No testing in interviewsPotential to hire full time 2022Your main role will be to determine, evaluate, test and support the implementation of key security controls for Identity and Access Management requirements throughout the Network organization, especially with Privileged Access Management solutions. You’ll be involved in technical discussions and decisions with senior security architects and asset owners. An agile and incremental approach is essential to deliver flawlessly this security environment.
Candidates must be self motivated, open minded and a passion for creativity. The successful candidate will partner closely with other security architects and specialist internally.
Your responsibilities:
Determine, evaluate, test and support the implementation of key security controls and for IAM and PAMSupport the Sr Security Architects in IAM solution designs and architecturesSupport Technical Analysts in the implementation of PAM solutions on internal assets, which includes the implementation, configuration, coordination, control, maintenance, troubleshooting, testing, usage monitoring and the development of systems infrastructureSupport Business Analysts in server to application mapping, privileged account mapping, presentation to stakeholders, demo and training activitiesUnderstand and improve the internal security operational processes with the introduction of new security controlsSupervise the development and implementation of new technological approaches, services and methods and analyze the resulting impact on security postureEssential skills:
5+ years of cyber security experience, including 2+ years of experience in design, implementation, and support of various Identity and/or Access Management (IAM) solutionsDemonstrated experience with Linux/Unix, Windows, scripting (REST API, Bash, PowerShell, Ansible), SQL, LDAP, and web servicesDemonstrated experience troubleshooting, managing, and solving issues related to identities, systems, access, accounts, authentication, authorization, entitlements, and permissionsExperience in some of the following: user provisioning, entitlement review and certification, enterprise directory architecture and design, role-based access control, single sign on, identity federation, multi-factor authenticationExperience with Network Element IAM and PAM controls (Firewalls, Routers, Switches, Wireless access points, Load Balancers, DDOS)Experience with Database IAM and PAM controls (Oracle, SQL Server, MongoDB, MariaDB, Cassandra, MySQL)Experience with cloud credential/secret management solutions such as Conjur and/or HashicorpDemonstrates knowledge of software development life cycle, DevOps, modeling of business processes, application design patterns, business/functional documents.Demonstrates knowledge of infrastructure subcomponents and interoperability.Experience with break glass solutions and implementations.Experience with Privileged Access Management solutions such as Cyberark or ThycoticHigh tolerance to ambiguity and ability to adapt in a fast-evolving environmentAbility to manage time and priorities across multiple projects and dutiesExcellent synthesis and analysis capacityBilingual (French and English) an asset