Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailRole: Identity Access Management (IAM)
Location : Minneapolis Minnesota
Job Descriptio:
MIM / FIM / Developer L2/L3 JDRequired Skills Experience in Architecting Designing Development and Deployment of :o Microsoft Identity Manager 2016o Forefront Identity Manager 2010 R2 Design and implement custom workflow rules develop custom management agent write management agent extensions.
Experience in programming like c# vb.net WCF web services power shell script is a must.
Experience in MS Visual Studio and MS Visual.
Experience in Sharepoint Dataware House.
Experience working with IIS Web Servers. Excellent knowledge and understanding of LDAP/AD concepts and working experience on Active Directory.
Hands on experience on MS SQL Server.
Should have the ability to understand customer scenario and requirements (may include integration situations) and be capable of suggesting solutions.
Should have good knowledge on SSO Strong Authentication and PKI (Public Key Infrastructure) technologies and products Exposure to SAML OAuth ADFS OpenID SPML XACML and other security related standards. Experience and exposure in RBACx Compliance solutions Access certifications solutions is an added advantage Excellent communication skills and ability to work with global counterparts.
Experience:
3 years of strong IAM implementation and support experience Strong oral written communications skills Customer Facing Exposure is mustQualification: Bachelors or Master degree in IT / CS or related fields
(1.) To clearly understand the clients cybersecurity environment and respective product.
(2.) To monitor configure and troubleshoot cybersecurity issues and related monitoring tools
(3.) To analyse and validate cybersecurity incidents indetail and help the L3 team with RCAordata or logs collection
(4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents test plans operational manuals and provide operational training to L1 team.
(5.) To analyse and finetune cybersecurity policies participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes.
(6.) To implement changes monitor security device performance and implements performance tuning when necessary.
(7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client
Full Time