Identity Governance Administration Architect (BB-FBA3F)
Encontrado en: Neuvoo CR
About the Role
Avanade security managerscollaborate on the development of information security architecture and ensure technology initiatives are implemented to make our client’s cloud environments more secure. Members in this role are accountable for securing enterprise information by identifying network and application security requirements, then design, planning, and continuous improvement of security controls and procedures. You will leverage your background in cloud identity, governance tools and analytics to create secure processes and assurance mechanisms for cloud native and private cloud environments.
Day to day, you will:
·Work closely with enterprise architects to identify and mitigate risks, perform security reviews, design premier security practices, and deliver strategic, innovative cloud-based security offerings
·Analyze user and synthetic behaviors across identity providers to inform security decisions
·Design and lead efforts to drive global and industry specific compliance in client cloud environments
·Develop metrics that will measure current risk
·Identify appropriate technology/data sources and drive the collection of data necessary to effectively evaluate threats
·Leverage industry leading tools and Avanade partners to consult on and perform Identity Governance & Administration (IGA)
The ideal team member will have a solid foundation across Microsoft technology stack and Azure security offerings.Youwill articulate security and risk-related concepts to key stakeholders using your experience and willingness to learn the following:
·Design and manage deployments of IGA tools from partners such as Microsoft, SailPoint, ForgeRock, Okta, CyberArk, PingIdentity, Savyint.
·Implement compliance frameworks such as ISO/IEC 27001, NIST 800-53, PCI DSS, HITRUST, FedRamp
·Integrate ILM, DAG, ITSM, SoD, and stand-alone tools to support full-featured IGA
·Extensive understanding of IAM concepts such as directory services, SSO, federation, MFA, provisioning, access certification, roles and SOD
·Data &analytics tools – Log Analytics, Azure Sentinel, AI/ML, Microsoft Defender
·Security architecture and design
·Solid grasp of security standard methodologies
·Proven implementation of cloud security models, particularly identity, network, and encryption
·Business case development skills for justifying, prioritizing & forecasting the funding requirements for security programs and initiatives
Your certifications may include: CISSP, CCSP, CGEIT, CyberArk L3, Saviynt IGA, BeyondTrustUPM,Certified Identity and Access Manager (CIAM), ForgeRock CertifiedSpecialist
To supplement the technical knowledge and project delivery experience, successful candidates will come from a consulting background with good customer facing skills, the ability to capture customer requirements and produce high quality written work.
You likely have a bachelor’s degree in computer science, computer engineering, management information systems, information technology, or a similar field. An equivalent combination of education and experience may substitute for a degree.
calendar_todayhace 1 día