drjobs IAM AM DevOps Engineer ID 2854

IAM AM DevOps Engineer ID 2854

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Jobs by Experience drjobs

8-9years

Job Location drjobs

Eindhoven - Netherlands

Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

As an IAM DevOps Engineer you will:
  • Be responsible for the design development configuration and operation of the IAM Access Management (AM) landscape including Okta and NetIQ Access Manager (NAM) (legacy).
  • Ensure seamless authentication experiences with Single SignOn (SSO) MultiFactor Authentication (MFA) and user provisioning.
  • Maintain and improve administrative access by leveraging automation tools like Terraform.
  • Connect applications to Okta using SAML OpenID Connect (OIDC) and SCIM protocols.
  • Refine and implement enablers for IAM features in collaboration with the product architect.
  • Actively participate in Agile ceremonies and work closely with the Product Owner to deliver IAM capabilities as per specifications.
  • Provide expert support and consultancy to stakeholders on IAM best practices.
  • Align with peers the Scrum Master and the Product Owner to ensure smooth operational planning and .
What You Bring to the Table:
  • 5 years of professional experience in Identity & Access Management (IAM). (Candidates with fewer years of experience but a strong willingness to learn in IAM are encouraged to apply.
  • 3 years of handson experience with Access Management (AM) tools.
  • Experience working with REST APIs and modern authentication/authorization protocols such as SCIM OAuth and OIDC.
  • Proficiency in automation tools such as Terraform and CI/CD pipelines with Jenkins.
  • Strong knowledge of Apache Tomcat Java and reverse proxy setups.
  • Experience handling application migrations and onboardings for Access Management.
  • Familiarity with authentication authorization and access management processes.
  • Working experience in Agile Scrum teams.
  • A solid understanding of security technologies best practices and security policy frameworks.
You Should Possess the Ability To:
  • Work independently with a proactive and resultsdriven mindset.
  • Drive process improvements and adapt to changing environments with a learningoriented approach.
  • Communicate effectively with stakeholders ensuring transparency and collaboration.
  • Solve technical issues related to IAM and provide highquality support.
  • Contribute to a securityfirst mindset within the IAM domain.
  • Work from the office during quarterly PI planning sessions.
What We Bring to the Table:
  • A dynamic and innovative work environment focused on IAM and security best practices.
  • Collaboration with a team of skilled professionals within an Agile Release Train (ART).
  • Opportunities for professional development and certifications in IAM and Agile methodologies.
  • Competitive compensation and benefits package.

As an IAM DevOps Engineer, you will: Be responsible for the design, development, configuration, and operation of the IAM Access Management (AM) landscape, including Okta and NetIQ Access Manager (NAM) (legacy). Ensure seamless authentication experiences with Single Sign-On (SSO), Multi-Factor Authentication (MFA), and user provisioning. Maintain and improve administrative access by leveraging automation tools like Terraform. Connect applications to Okta using SAML, OpenID Connect (OIDC), and SCIM protocols. Refine and implement enablers for IAM features in collaboration with the product architect. Actively participate in Agile ceremonies and work closely with the Product Owner to deliver IAM capabilities as per specifications. Provide expert support and consultancy to stakeholders on IAM best practices. Align with peers, the Scrum Master, and the Product Owner to ensure smooth operational planning and . What You Bring to the Table: 5+ years of professional experience in Identity & Access Management (IAM). (Candidates with fewer years of experience but a strong willingness to learn in IAM are encouraged to apply. 3+ years of hands-on experience with Access Management (AM) tools. Experience working with REST APIs and modern authentication/authorization protocols such as SCIM, OAuth, and OIDC. Proficiency in automation tools such as Terraform and CI/CD pipelines with Jenkins. Strong knowledge of Apache, Tomcat, Java, and reverse proxy setups. Experience handling application migrations and onboardings for Access Management. Familiarity with authentication, authorization, and access management processes. Working experience in Agile Scrum teams. A solid understanding of security technologies, best practices, and security policy frameworks. You Should Possess the Ability To: Work independently with a proactive and results-driven mindset. Drive process improvements and adapt to changing environments with a learning-oriented approach. Communicate effectively with stakeholders, ensuring transparency and collaboration. Solve technical issues related to IAM and provide high-quality support. Contribute to a security-first mindset within the IAM domain. Work from the office during quarterly PI planning sessions. What We Bring to the Table: A dynamic and innovative work environment focused on IAM and security best practices. Collaboration with a team of skilled professionals within an Agile Release Train (ART). Opportunities for professional development and certifications in IAM and Agile methodologies. Competitive compensation and benefits package.

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.