Identity & Access Management Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity & access management engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

  • Craft your perfect resume by picking job responsibilities written by professional recruiters

  • Pick from the thousands of curated job responsibilities used by the leading companies

  • Tailor your resume by selecting wording that best fits for each job you apply

CB
C Bosco
Chesley
Bosco
39991 Dickens Junction
Boston
MA
+1 (555) 854 5087
39991 Dickens Junction
Boston
MA
Phone
p +1 (555) 854 5087
Experience Experience
03/2015 present
Chicago, IL
Lead Identity & Access Management Engineer
Chicago, IL
Lead Identity & Access Management Engineer
03/2015 present
Chicago, IL
Lead Identity & Access Management Engineer
03/2015 present
  • Provide direction, task assignment management, and technical oversight to the Identity & Access Management team
  • Function as subject matter expert for CA IdentityManager, Varonis and Avkesa products and the services provided by the department
  • Monitor staff performance and function as a major contributor in the mid-year and year- end performance process
  • Manage work scheduling and PTO/holiday coverage
  • Manage incident and issue escalations
  • Document, maintain and communicate the strategy related to the products and services provided
  • Privileged identity management support and implementation activities
02/2008 01/2015
Los Angeles, CA
Identity & Access Management Engineer
Los Angeles, CA
Identity & Access Management Engineer
02/2008 01/2015
Los Angeles, CA
Identity & Access Management Engineer
02/2008 01/2015
  • This individual will provide guidance on integrating the identity management authentication and authorization framework into new and existing applications
  • Seek opportunities for process improvements, recommending and contributing to solutions by developing risk and opportunity plans
  • Work with adjacent teams to integrate new services with other platform web services providing user identity and analytics
  • As one of the primary focus of the position is the development and implementation of the Web Access Management System
  • Proactively seek opportunities for process improvements, recommending and contributing to solutions by developing risk and opportunity plans
  • Works closely with application developers to maintain custom extensions of IAM environment
  • Provide Operational support for Cloud Based Identity Services (CIS) providing Identity and Authentication Services to 8 Million users
03/2003 12/2007
Boston, MA
Identity Access Management Engineer
Boston, MA
Identity Access Management Engineer
03/2003 12/2007
Boston, MA
Identity Access Management Engineer
03/2003 12/2007
  • Monitoring the teams trouble ticket and escalation queue for new incidents and working to resolve and/or escalating to senior engineers
  • Performs other job-related duties as assigned or related to IAM technologies
  • Develop strategic road maps for IAM systems and program
  • Perform updates to support all IAM tools within the environment
  • Generating and/or designing application level reporting for management, internal customers, and auditors
  • Implement and expand Identity & Access Management tool sets to their full potential
  • Provide timely and concise status to customers and team members for engagements
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of California, San Diego
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to think with a security mindset. The successful candidate has a strong IT background with in-depth Identity and Access Management knowledge
  • Excellent verbal and written communication skills able to speak directly and professionally even when challenged
  • Strong desire to eliminate ambiguity and produce predictability
  • Possess good Identity and Access Management domain knowledge
  • Able to lead junior team members and ensure their work product is in line with quality standards and expectations
  • Proactively and continuously evaluate and address issues related to performance, stability, scalability, and extensibility of the systems
  • Expert technical knowledge of Identity and Access Management, Single Sign-On, and Federation. Advanced knowledge of LDAP, SAML, OpenID, Oauth
  • Detail, quality, and customer-oriented
  • Basic Java knowledge for writing custom plugins and/or general Java development experience
  • Excellent verbal & written communication skills with an ability to adapt communication style to intended audience
Create a Resume
1

Senior Identity & Access Management Engineer Resume Examples & Samples

  • Bachelor’s degree in a technical area of study (computer science, mathematics, engineering, etc.) or other BS/BA degree with a concentration in computer science or information systems
  • 5+ years of IT experience with 3+ years doing Identity Access Management (IAM) or security-related technology development and support
  • 5+ years of infrastructure engineering and support experience
  • CA-SiteMinder and/or Netegrity SiteMinder product suite development, deployment, support and engineering required
  • Directory services experience and expertise required (LDAP, Active Directory)
  • Experience with a variety of technologies/platforms including: Microsoft, Unix, Linux, z/OS, Websphere, WebLogic, JBoss, etc
  • Experienced with projects involving integration of disparate types of technologies/platforms
  • Solid understanding of development methodologies (Waterfall, iterative, etc.)
  • Working knowledge of financial applications as well as host-based systems
  • Project management experience highly desirable
  • Experience in designing and implementing systems in a team environment
  • Experienced with different aspects of architecture including application, data, security and infrastructure
  • Ability to provide effective facilitation in managing technical issues
  • Ability to quickly evaluate options, make decisions and execute within an intense high-tech environment
  • Previous experience in financial services industry highly desired
  • Security specific training and certification is highly desired. (i.e. CISSP, CISM, or CISA)
  • Enterprise Architecture frameworks: TOGAF, Zachman etc
  • Excellent communication, facilitation and presentation skills
2

Identity & Access Management Engineer, Mid Resume Examples & Samples

  • 5+ years of experience with designing, architecting, implementing, operating, and maintaining identity management solutions covering identity life cycle management, credentialing, smart cards, including PIV, PIV-I, and PIV-C, user attestation, compliance, and role discovery and management
  • 5+ years of experience with designing, architecting, and implementing access control solutions covering logical and physical access controls systems and different dynamic access control models, including RBAC, ABAC, PBAC, and RAdAC
  • 5+ years of experience with Active Directory and LDAP directories
  • 3+ years of experience with implementing federation solutions in Cloud and SaaS environments leveraging SAML, WS-Fed, and ADFS
  • 3+ years of experience with training end-users and business process engineering and optimization
  • Experience with administration of Windows servers, database servers, including PostGres and SQL Server, and Web servers, including Tomcat and IIS
  • Knowledge of HSPD-12, PIV, CAC, FIPS 201, ICAM, NIST SP 800-53, FISMA, NSTIC, and other federal IAM-related directives, standards, and mandates
  • Experience with Cloud computing and infrastructure, including Amazon Web Services and Verizon Terremark
  • Experience with PKI, PKE, and x.509 certificate-based authentication
  • Experience with Web and application servers, including IIS, Apache, and Tomcat
  • Knowledge of USAccess, HRConnect, and other federal US government systems
  • Possession of excellent consulting skills
  • BA or BS degree in CS, Information Sciences and Technology, MIS, or a related field preferred; MA or MS degree a plus
  • CISSP or Security+ Certification
3

Identity & Access Management Engineer, Mid Resume Examples & Samples

  • 1+ years of experience with engineering or software development and contributing to projects involving identity and access management (IdAM) solutions, including user provisioning, role-based access control, authentication, and authorization
  • Knowledge of security technologies, including digital signature, encryption, and multi-factor authentication
  • Knowledge of the engineering life cycle and change management
  • Ability to quickly grasp technical policy and specifications and communicate the information effectively
  • Experience with IdAM COTS software or secure Web service messaging
  • Experience with enabling digital signature and encryption for Outlook or Adobe
  • Experience with developing strategy or roadmaps documents for clients and documenting new and updated business processes resulting from new technology solutions
  • Experience with implementing, supporting, and troubleshooting a public key infrastructure
  • Knowledge of underlying solution protocols, including SSL/TLS, HTTP, SAML, Kerberos, and S/MIME
  • Knowledge of physical access control systems and federated identity protocols
  • Knowledge of UNIX and Linux and online certificate status protocol (OCSP)
  • Knowledge of PKI (generic), single sign-on (SSO), RSA SecureID, and PingFederate solutions
  • BA or BS degree in CS, IT, or a related field
  • CISSP, Security+, CISA, or CISM Certification
4

Identity & Access Management Engineer Resume Examples & Samples

  • Works with various organizations within Paypal to translate provision/de-provision, RBAC and Certification requirements into technical specifications
  • Develops Identity management integration plan, framework for internal and external applications
  • Work closely with IAM Architect
  • Work with various in house team or external vendors
  • Provides technical expertise on evaluation and selection of new IAM products
  • Leads design reviews with technical staff and provide guidance on programming standards and best practices
  • Provides support to project managers in developing detailed project plans
  • Provides guidance to access administrators on best practices for RBAC engineering
  • Works directly with systems administrators during deployment
  • Provides support coverage for Identity Management platform
  • Troubleshooting the production environment and working with vendor ticketing system
  • Conduct/coordinate Unit Tests/ System Tests and Performance testing of Identity Management System
  • Co-ordination with L1/L2 Support IAM team
5

Lead Identity & Access Management Engineer Resume Examples & Samples

  • Future state planning, emerging trend research, and influence into the roadmap
  • Orchestration of product evaluations
  • Implementation and design of IAM technologies
  • Ability to identify and efficiently automate manual tasks
  • Identity lifecycle management
  • Access management technology support and implementation activities
  • Privileged identity management support and implementation activities
  • Deep knowledge and highest level troubleshooting skills for the entire IAM stack
  • 8+ years of applications support or equivalent experience with a specialization in Identity and Access Management platforms and tools
6

Identity & Access Management Engineer Resume Examples & Samples

  • Must have experience with several of the following: Bash/Korn shell, Java, Subversion, LDAP, Oracle, SQL, PLSQL, JQuery,
  • Experience with Goovy/Grails, Active Directory, >Net, or MS SQL a plus
  • Knowledge of modern development lifecycles, including Waterfall, Agile and iterative development
  • Experience with ETL development is required
7

Lead Identity & Access Management Engineer Resume Examples & Samples

  • A Bachelor's or Master's degree in Computer Science or Information Systems. Supporting certifications in IAM or security are beneficial
  • LDAP directories
  • Identity management packages (Provisioning, De Provisioning)
  • SAML
  • Authentication mechanisms (multi factor authentication, one time passwords, adaptive authentication)
  • Public Key Infrastructure including hardware security modules (HSMs)
  • Identity attestation compliance packages
  • Privileged identity management
  • SCIM
  • SAML, Oauth, OpenID
  • Venafi
  • PKI
  • Ping Identity
8

Identity & Access Management Engineer Resume Examples & Samples

  • Strong knowledge of web servers, cluster management, high availability, root cause analysis, systems optimization, configuration and source code management, database administration, scripting language, backups, caching, storage, packet analysis, DNS, HTTP, FTP, SNMP, SSH, IPSEC, virtualization, networking, firewalls, load balancing, troubleshooting, stack trace analysis, methodologies of design and implementation
  • Strong understanding of Single Sign-On, Federation, PKI, Kerberos and cross-realm concepts, Identity Synchronization and Multi-Factor Authentication
  • Experience in taking ownership of problem life cycle and providing constructive feedback during systems/code reviews and design sessions
  • Strong understanding of design principles, specifically OS and active directory services security hardening
  • Strong knowledge of Linux, XML, and Javascript. Java Beans knowledge preferred
  • Experience with Novell NetIQ eDirectory & IDM preferred
  • Strong knowledge of automation principles and design
  • Experience designing and implementing high availability systems adhering to change management process/procedures
  • Experience collaborating with vendors and the broader tech community on implementing solutions to bugs and code upgrades
  • Bachelor's degree in Business or Computer Science
  • Usually requires 8+ years of information systems, design and/or project management experience
  • 5+ years experience with enterprise Identity & Access Management Systems
9

Senior Identity Access Management Engineer Resume Examples & Samples

  • Responsible for architecture, implementation and engineering IAM solutions using Sailpoint IdentityIQ technology
  • Engineering and administration of IdentityIQ including but not limited to application onboarding, role mining, launching access certification and attestation campaigns
  • Design and develop provisioning and de-provisioning processes / workflows for accounts across various internal and external systems
  • Configure and develop adapters and connectors with various systems and databases for account provisioning, de-provisioning and updates to user accounts
  • Work with various business and application teams with their User Lifecycle Management provisioning requirements
  • Configure and develop access control roles for various applications to fulfil SOX compliance
  • Work with Security and Compliance teams to provide auditing and reporting facilities and processes
  • Work with Enterprise Architecture and Business teams to identify new areas where IAM can be utilized and enhance IAM capabilities to address new business needs
  • Integrates Sailpoint solution with in-house and third party applications for birthright provisioning, request approval and fulfilment, deprovisioning, custom workflows etc
  • Performs and/or leads IAM technical support and development, including monitoring and responding to server events, ensuring data replication, gathering IAM statistics, and performing general maintenance by working with Level 2 and/or Level 3 operations personnel
  • Manage existing IAM infrastructure and provide Level 2/3 support. Work with help desk and other teams to troubleshoot and resolve/ fix issues and bugs. After-hours work as needed for Level 3 escalations and/or deployments
  • Minimum 2 years’ experience with Sailpoint Identity IQ or other Identity Management provisioning systems
  • Minimum 4 years’ experience with LDAP/Directory Server design, engineering and support
  • Experience setting up and installing software on both Windows and Unix
  • Experience with programming languages like Java, JavaScript, JSP/Servlets
  • Deep understanding of and experience with access governance products such as Sailpoint
  • Solid understanding of SOX requirements for access governance
  • Experience managing complex directory service and IAM environments
  • Scripting and programming skills, shell/Perl, interfacing to LDAP using APIs
  • Experience developing and implementing Access Request forms/workflows and provisioning / de-provisioning of user access. Customization of product functionality to meet business requirements
  • Unix/Linux experience on physical or virtual systems
  • Experience working in SOX controlled environments
  • Ability to troubleshoot and resolve issues quickly, identifying the best option in an emergency situation
  • Ability to work with different teams and interact with technical and business personnel across the Enterprise
10

Lead Identity & Access Management Engineer Resume Examples & Samples

  • Provide direction, task assignment management, and technical oversight to the Identity & Access Management team
  • Serve as a point of contact and department representative for business contacts and customers
  • Function as subject matter expert for CA IdentityManager, Varonis and Avkesa products and the services provided by the department
  • Manage incident and issue escalations
  • Ensure high availability of core infrastructure platforms: CA IdM, Aveksa & Varonis
  • Document, maintain and communicate the strategy related to the products and services provided
  • Monitor staff performance and function as a major contributor in the mid-year and year- end performance process
  • Drive issue resolution and communication
  • Facilitate routine team meetings and individual team member meetings
  • Manage work scheduling and PTO/holiday coverage
  • Represent the team and technology platform in technical discussions with other technology teams that drive strategy
  • Experience leading major projects and/or project teams deploying and customizing middleware or identity access management systems
  • Prior team management experience preferred
  • Three or more years of engineering experience related to identity and access management in mid to large corporate environments
  • Three or more years of experience with CA IdentityManager; R12.x preferred
  • Experience with eTrust Admin, IM Application, IdM Policy Express, IdM Connector Express, SQL Programming, Java programming, Jboss, Linux, SQL and Windows/Linux server platforms
  • Previous experience within a Financial Services environment preferred
  • CISSP preferred
  • Strong written and verbal communications skills and a customer service focused orientation
  • Ability to mentor and coach team members
11

Identity & Access Management Engineer Resume Examples & Samples

  • Manage Identity and Access program
  • Coordinate onboarding overview training sessions with HR
  • Point of Contact for Specialized Screening
  • Work with management team to determine staffing needs
  • Identify/communicate organizational screening risks and issues
  • Monitor progression screening status
  • Plan & drive proof of concept projects with new technology & processes
  • Build requirements for tools & contribute to our knowledge base
  • Document requirements to optimize monitoring & automation capabilities
  • Experience with IAM technologies and policies
  • Experience and familiarity with compliance frameworks including but not limited to: Fedramp, ISO 27001/27018,, NIST 800-53
  • Experience driving projects without direct authority
  • Ability to drive consensus and foster collaboration
  • Strong desire to eliminate ambiguity and produce predictability
  • Demonstrated expertise in web services, virtualization, cloud concepts, REST, JSON, XML, MySQL, PHP, & object oriented methodologies
  • 5+ years’ experience in large scale internet service operations and service delivery
  • Experience with continuous delivery & configuration management
12

Identity & Access Management Engineer x Resume Examples & Samples

  • Assisting in product evaluations
  • Identity access governance support and implementation activities
  • 5+ years of applications support or equivalent experience with a specialization in Identity and Access Management platforms and tools
  • SailPoint Identity IQ or SailPoint Security IQ
  • CyberArk
  • Ping Federate
  • NetIQ eDirectory and Identity Manager
13

Identity Access Management Engineer Resume Examples & Samples

  • Understanding industry best practices, JPMC policies and standards, and the Commerce Solutions operating environment
  • Monitoring the teams trouble ticket and escalation queue for new incidents and working to resolve and/or escalating to senior engineers
  • Monitoring the primary customer request queues and both validating and fulfilling those requests
  • Completing all daily, weekly, and monthly operational tasks
  • Implementing or Promoting changes to the production environment on behalf of senior level architect/engineer during designated non-peak hours
  • Generating and/or designing application level reporting for management, internal customers, and auditors
  • Conducting quality reviews on work completed by other team members
  • Collaborating on the solutions designs that implement or enhance the technologies necessary to manage, monitor, and safeguard Chase Commerce Solutions technology assets and operating environment
  • Maintaining, monitoring, and supporting, all software components used in the delivery of infrastructure services
  • Managing engagements with new internal IT service customers who require the use of infrastructure services
  • Maintaining and updating existing documentation and user guides
  • Identifying risks as it pertains to system patching, Anti-Virus controls, systems monitoring, systems management, and compliance within the Chase Commerce Solutions operating environment and ways to reduce or resolve those risks
  • Minimum 3 years general experience with maintaining, deploying, and configuring Windows Server 2008 or higher severs
  • Minimum 1 year experience in Operations or Production Support roles for "IT to IT" applications and/or services
  • Strong fundamental understanding of the following related technical areas: Linux/Unix Operations Systems, DNS, IIS, Active Directory, Access Administration, Command Line tools/PowerShell, Networks and routing, client connectivity methods to MS SQL/Oracle databases
  • Minimum 1 year experience with administrating CyberArk EPV 7.x- 9.x or comparable Password Vaulting and Management or Identity and Access Management tool
  • Minimum 1 year hands on experience supporting Windows application servers and/or Windows Server clusters in a production environment
  • Strong fundamental understanding of authentication connection methods and access protocols (SSH and Shared Keys, SSL, RADIUS, KERBEROS, NTML, RPC, etc)
  • Strong fundamental understanding of ETL processes and client based query and reporting tools including MS SQL Query, MS SQL Server, MS Access, and MS Excel (Advanced Features) for both ad hoc reporting and offline data quality analysis
  • Experienced with developing procedures and documenting processes
  • Experience supporting mission critical or continuously availability Windows Server based solutions
  • Experience supporting application services distributed across secure network environments, over a Wide Area Network, behind or between firewall controlled network zones, and across multiple Active Directory security domains
  • Experience with supporting any of the following products: Microsoft Active Directory, Microsoft System Center Configuration 2012 , Microsoft System Operations Manager 2012, Symantec End Point Manager
  • Experience with configuring some or all of the following technologies: server virtualization and hypervisors, Microsoft Cluster Service, Windows Firewall, Network Load Balancers
  • Strong understanding of performance, monitoring, capacity, and disaster recovery planning
  • Demonstrates an understanding of process-focused methodologies that structure IT related activities (Change Management, Incident Management, SDLC)
14

Identity & Access Management Engineer Resume Examples & Samples

  • Assist with build, configure and deploy IAM and PAM toolsets according to design and business requirements
  • Lead the administration, governance, compliance and maintenance of IAM systems and processes
  • Design and coordinate monitoring and alerting process for key access and authentication controls
  • Broad ownership or administration of automated provisioning tools and processes
  • Support incident response process on an as needed basis
  • Responds to and provides support for tickets/incidents escalated
  • On-going operational tasks and reporting requirements
  • Creation of detailed process documentation
  • Assist and mentor peers in system configuration, design and administration of IAM tools
  • Ability to communicate technical issues to non-technical audiences across functions
  • Completes tasks with moderate supervision
  • Develops/designs solutions based on established technical design with guidance from senior-level associates
  • Accurately updates documents
  • Able to work independently and efficiently to meet deadlines
  • Able to promptly answer support-related email, phone call and other electronic communications
  • Self-motivated, detail-oriented, and organized
  • Ability to evaluate data and perform root cause analyses
  • Provides support and maintenance of user tools
  • Demonstrated security architecture knowledge/experience
  • Troubleshoots simple to intermediate problems and recommends appropriate action
  • Prioritizes tasks and communicates status
  • Recognizes and escalates risks and issues
  • Open minded and willing to accept directional changes
  • Advanced experience in Windows and Linux operating systems
  • Advanced understanding of Privileged Access Management controls and tools
  • Demonstrate advanced knowledge and skills related to IAM and privileged access management
  • Ability to work with and design Active Directory, LDAP, and other Enterprise Directories
  • Refined communication skills: verbal and written
  • Time management and task prioritization
  • Ability to work independently and comfortable sharing roles on a team
  • Moderate understanding of primary security control frameworks. (i.e. SANS, NIST, etc.)
  • Required: Bachelor’s Degree from an accredited college/university with an emphasis in computer science
  • Required: 3-5 years related experience regarding the implementation and support of IAM and privileged management tools
  • Security certifications strongly preferred such as CISSP, CISM, CRISC or relevant SANS certification
15

Identity Access Management Engineer Resume Examples & Samples

  • Develop PowerShell scripts to automate privileged account management activities such as provisioning, de-provisioning, security alerts, logging, access certification onboarding, bulk account attribute configuration
  • Support the PAM/IAM team
  • 3+ years in experience in an IAM/PAM related field
  • Deep knowledge of Active Directory - Suggested 3+ years of experience with engineering, architecting, and deploying enterprise wide Microsoft Active Directory technologies
  • Intermediate-level PowerShell coding experience
  • Intermediate-level Java and SQL development experience
  • Intermediate-level knowledge of privileged account isolation and privilege reduction concepts
  • Experience developing and refining threat-informed defense-in-depth security architectures
  • Additionally should possess basic experience or knowledge in the following
  • Knowledge of enterprise IAM technology suites, and capabilities including but not limited to
16

Identity & Access Management Engineer Resume Examples & Samples

  • 2+ years experience working in an IT development setting
  • Good communication skills and experience of working with customers to understand their requirements
  • Troubleshooting skills and an appetite for researching and learning new technologies
  • Understanding of the basic principles of Identity and Access Management
  • Willingness to jump into any situation with enthusiasm and the ability to perform proper analysis and solutioning
  • Basic Java knowledge for writing custom plugins and/or general Java development experience
  • Experience working within the IT security or Identity Access Management spaces
  • Web page development and customisation using CSS
  • Basic understanding of networking concepts
  • Awareness of automation technologies and development processes
  • Experience with the ForgeRock suite of IAM products
  • Experience of AWS as a hosting platform
  • Experience in Radiant Logic RadiantOne or other LDAP directories
  • Experience with Axiomatics
17

Identity & Access Management Engineer H Resume Examples & Samples

  • Leverages knowledge, expertise and experience to facilitate the operation and evolution of robust identity access management solutions
  • Supports the architecture designs, engineering and operational documentation
  • Serves as a subject matter expert supporting, administering and managing multiple disciplines and identity & security platforms
  • Partners with the lone of business areas to design and develop provisioning work flows along with Role Based Access Control (RBAC) entitlements to applications
  • Gathers and analyzes functional and technical requirements to determine organization impacts then helps plan to deal with impacts to eIAM
  • Communicates with IT and line of business representatives on both the products and framework approach at the technical and functional level
  • Supports acceptance testing, quality assurance testing, debugging, support and maintenance
  • Provides complex integrated systems planning and provides recommendations that will enhance current or anticipated information systems that support overall corporate and business goals for an Identity & Access Management service to the enterprise
  • Ensures the review and design concepts for new systems and develops and documents the technical design for the integration and implementation of the software
  • Creates and maintains operational documentation and playbooks
  • Consults and directs identification of alternative uses of technologies that will enhance current or anticipated information systems and that support overall corporate and business goals that are appropriately aligned with the enterprise architecture
  • Keeps abreast of leading and emerging software products and technologies as well as industry standards
  • Compares and evaluates the design and capabilities of multiple system components (e.g., architecture, network, operations and communications)
  • Leverages knowledge, expertise and experience to facilitate the development of robust identity access management solutions
  • Coaches as appropriate. Acts as a resource for staff. Provides reviews and monitors work products. Provides on-the-job training on techniques and methodologies. Provides knowledge transfer as appropriate
  • CISM, CISSP, CISA, or other information security or risk management related certifications a plus
  • 2+ years of experience of advanced security technologies and concepts, including user provisioning, Single Sign-on directory services, RBAC or Digital Certificates
  • 3+ years technical experience integrating identity and access management software
  • 2+ years Provisioning experience
  • 2+ years RBAC experience
  • Experience developing identity management strategies, architectures and implementation plans
  • Solid experience with Directory Services and LDAP
  • Familiarity with major operating systems such as Microsoft Windows and Unix
  • General understanding of TCP/IP networks, HTTP and DNS technologies
  • Demonstrated ability to write report segments and to participate in presentations
  • Ability to work as a member of a team and independently
  • Open to travel requirements
  • Proficient working with UNIX/Linux systems and is reasonable self-sufficient managing them
  • Experience with one or more Database platforms (Oracle, Sybase, MSSQL, MySQL, DB2)
  • Hands on experience in implementing an identity and access management system (Oracle OIM), developing workflows and developing requirements to integrate target applications to the system
  • Hands on experience with integration & implementation of identity & access audit / review / governance solutions such as Oracle Identity Analytics
  • Hands on experience with integration & implementation of Role Management functions including those of Oracle Identity Analytics and similar products
  • Experience in using Governance, Risk and Compliance (GRC) tools
  • Familiarity with RBAC and profile workflow creation
  • 1+ years of CyberArk operations, engineering, design or implementation
  • 3+ years expertise with deployment and support of Oracle Identity Management suite (10/11g) of products (OAM, OIM, OIA, ESSO) RACF
  • Familiar with SAML authentication and authorization
  • Federation
  • Experience managing projects through the full system development lifecycle
  • Java development skills
  • Experience with the following development languages: SQL, J2EE, Java, JavaScript
18

Identity & Access Management Engineer, Lead Resume Examples & Samples

  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role-based access control, authentication, and authorization, such as SailPoint, CyberArk, PowerBroker, Okta, Active Directory, or ForgeRock
  • Experience with consulting communicating with clients at multiple levels of an organization
  • Experience with one or more IAM products, including directories, multi-factor authentication, provisioning tools, and single-sign-on tools
  • Ability to work with teams and be flexible to work on a diverse set of clients
  • Experience with Cloud-based systems and deploying IAM to Software as a Service solutions
  • Experience with Web development
  • Experience with designing and deploying IAM process workflow
  • Knowledge of solution protocols, including SSL/TLS, HTTP, SAML, Kerberos, S/MIME, SCIM, and oAuth
  • BA or BS degree preferably in CS, IT, Engineering, or a related field
19

Identity & Access Management Engineer Resume Examples & Samples

  • Monitor CyberArk Infrastructure services
  • Provide onCall support for Sev2, Sev1 incidents
  • Troubleshoot and resolve access related issues
  • Provide escalation point for lower level support team members
  • Works with SME's (Subject Matter Experts) and peer engineers to understand needs and architect appropriate solutions
  • Generate PUM reports as needed
  • Excellent verbal & written communication skills with an ability to adapt communication style to intended audience
  • Effective at facilitating and leading group discussions/meetings, building consensus and managing issues and risks
  • 4+ years of experience in implementation and integration of CyberArk' s Privileged Identity Management Suite V7.2 and higher
  • Strong understanding of the CyberArk Privileged Access Security Suite
  • Conceptual Thinking
20

Identity Access Management Engineer Resume Examples & Samples

  • Apply security protocols – including PKI, 2FA, single sign-on and two factor authentication – in a complex IT infrastructure environment
  • Utilize IAM products (Oracle, Sailpoint, Aveksa, Ping) and IAM technologies (SAML, OAuth, OpenID) in day-to-day activities in the customer environment
  • Assess and solve issues in the high-pressure environment
  • Design and implement security strategies to address anomalies
  • Interface with customers to discuss findings and explain mitigation strategies
  • Multitask without sacrificing attention to details
  • Apply analytical skills to come up to speed on new project areas quickly as this role will grow quickly
  • Bachelor's degree in engineering, systems engineering, physics, computer science, management information systems, or related field
  • Nine or more years of experience in an engineering or operating systems programming role
  • At least 7 years experience utilizing security protocols including PKI, 2FA, single sign-on and two factor authentication
  • Strong leadership skills to effectively mentor and lead junior level personnel
  • Experience working with the security protocols identified above with a concentration in one or more areas
  • Experience working with structured programming languages
  • Experience applying IAM products (Oracle, Sailpoint, Aveksa, Ping) and IAM technologies (SAML, OAuth, OpenID)
  • Possess strong analytical skills
  • Strong analytical and creative problem solving skills for design, creation and testing of complex systems
  • Strong interpersonal skills to interact with customers, senior level personnel, subordinates and team members
  • Ability to integrate highly complex hardware and software systems
  • Experience with FICAM Roadmap and Security architecture
  • Current certifications in all the required skills is strongly desired
21

Identity & Access Management Engineer, Lead Resume Examples & Samples

  • Experience with consulting and communicating with clients at multiple levels of an organization
  • Experience with Cloud-based systems and deploying IAM to software as a service solutions
  • Experience with designing and deploying an IAM process workflow
  • BA or BS degree in CS, IT, Engineering, or a related field preferred
22

Identity Access Management Engineer Resume Examples & Samples

  • Works with customers to understand and develop integration requirements
  • Provisions and deploys infrastructure and software to support integration projects
  • Automate, engineer, and evolve our standard solutions
  • Triage and support issues in our non-Production and Production environments
  • 2+ years of Identity Access Management domain knowledge
  • Security administration & support
23

Identity & Access Management Engineer Resume Examples & Samples

  • Maintains the IBM Security infrastructure and software with system patches and upgrades
  • Troubleshoots and resolves infrastructure issues working together with messaging, AD, Web teams and application owners
  • Works closely with application developers to maintain custom extensions of IAM environment
  • Engages with IBM technical support service when necessary
  • Maintains optimal performance of IAM infrastructure by monitoring and assessing hardware/software performance. Recommends changes/enhancements to improve system availability, reliability, and performance
  • Conducts regular or emergency maintenance or software upgrades; provides occasional afterhours or weekend support
  • Provides on-going knowledge transfer to team members on security products and standards
  • Minimum of 2 years of experience with IBM Security Suite (required)
  • Experience supporting IAM software and infrastructure; including firmware upgrades and system administration (required)
  • Bachelor’s degree in Computer Science, Information Technology or related field of study
24

Identity & Access Management Engineer, Lead Resume Examples & Samples

  • On experience with deploying leading edge commercial tools, display the ability to quickly and efficiently assess a client's current state and gaps, and leverage excellent communication expertise to interact with executive leaders, business unit managers, and IT staff. This position requires the ability to travel throughout the continental US, as needed, and may be located in New York City, NY, Washington, DC or the Northern VA area, Philadelphia, PA, NJ, CT, or VA
  • 5+ years of experience with deploying one or more IAM solutions, including user provisioning, role
  • Based access control, authentication, and authorization, such as SailPoint, CyberArk, PowerBroker, Okta, Active Directory, or ForgeRock
  • Experience with one or more IAM products, including directories, multi
  • Factor authentication, provisioning tools, and single
  • Sign
  • On tools
  • Experience with Cloud
  • Based systems and deploying IAM to software as a service solutions
25

Lead Identity & Access Management Engineer Resume Examples & Samples

  • Deep knowledge and skilled at troubleshooting
  • A Bachelor's or Master's degree in Computer Science or Information Systems or equivalent
  • CyberArk or Sailpoint
  • Java and Powershell
  • EDirectory
  • Duo Security
26

Lead Identity & Access Management Engineer Resume Examples & Samples

  • Oversee the installation, configuration, and deployment Identity and Access Governance technologies; monitor the performance, reliability and availability of the IGA service and ensure operational run books are maintained and updated
  • Ensures Identity and Access, Federation, Password Management and Privileged Access Management systems run effectively and efficiently by coordinating with the product vendor, implementation vendor and run team
  • Provide input into the development and implementation of IGA policies and processes for the allocation of access rights across the enterprise
  • Defect/Incident prioritization as per the business impact -- establish a release schedule for defect fixes to maintain stability
  • Establish and drive the change management effort in the QA and Production environments
  • Oversee the maintenance of non-production and production environments, manage code promotion to production following corporate change management guidelines and work with IAM product vendors to open and manage the support requests
  • Resolve incidents and respond to audits per documented SLA timeframes and according to Takeda policies
  • Identify systemic problems based on common IGA incidents and provide and implement holistic resolutions to process, technology, education
  • Optimize IGA processes over time, to provide better agility and operational efficiency
  • 10+ years of work experience in information security or related field, which includes project and technology implementation experience
  • 7+ years identity & access management/identity & access governance experience
  • Experience with implementing and operating IGA technologies in a global environment
  • Experience in evaluating, selecting, and implementing IGA technology solutions, including awareness of emerging security and IAG trends and tools
  • Experience working in a global organization, collaborating with a global team of onsite and offshore professionals
  • Strong customer service orientation, personal commitment and accountability to deliver a best in class quality of service
  • Exceptional and proven leadership capabilities - communication, influence, negotiation, conflict resolution, people management, relationship management (internally/externally), and multi-tasking
  • Solid project management skills including the ability to effectively manage multiple projects of various diverse scope in a matrix and cross-functional environment
  • Bachelors, Computer Science, Computer Engineering, Electrical Engineering, Management Information Systems (MIS), or equivalent
  • In-depth understanding of the regulatory environment, industry standards, and best practices within drug development and the pharmaceutical industry
  • Experience in overseeing a global operational information security function
27

Identity & Access Management Engineer Resume Examples & Samples

  • Participate in the design and implementation of well-architected and scalable service web architectures through the evaluation, integration and deployment of open source and commercial components
  • Possess good Identity and Access Management domain knowledge
  • Possess good working knowledge of Identity Management tools, preferably in Sailpoint IIQ IAM System, LDAP, Java and Web Services
  • Possess experience and working knowledge in Identity Lifecycle Management, Application Onboarding, Lifecycle Manager and Workflows, Access Certification, Auditing and Reporting in Sailpoint IIQ or any other comparable IAM product
  • Take on areas of technical ownership within the overall solution and be the go to person for technical guidance, design and code reviews, and problem solving
  • Work with adjacent teams to integrate new services with other platform web services providing user identity and analytics
  • 4-7+ years of experience in identity management or related technologies
  • Experience with any IAM tool
  • Experience in web application development using Java, JavaScript,etc
  • Ability to synthesize robust and cost-effective technical solutions against customer requirements
  • Self-directed technical lead, willingness to take ownership and drive for results, propose technical directions, make decisions and resolve issues
  • Focus on effective decision making across the job requirements. Detail-oriented, results-oriented and pragmatic but innovative and creative
  • Strong customer experience focus
  • Able and willing to effectively mentor junior team members and contribute to a collaborative team environment
  • Excellent verbal and written communication skills able to speak directly and professionally even when challenged
  • Energetic team player who works well across boundaries and readily adapts to change and enjoys rapid development
  • Committed to deliver on time according to requirements and business needs
28

Senior Identity & Access Management Engineer Resume Examples & Samples

  • Decisive, action-oriented individual who takes ownership of open issues and can drive to a solution set
  • Expertise in designing, analyzing and troubleshooting IAM systems
  • Understanding of DevOps methodologies and how to apply them to Identity platforms
  • 5+ years’ experience in designing, building, and supporting Active Directory Directory Services solutions/environments
  • 2+ years’ experience hybrid environments including supporting AD Azure and DirSync / Azure AD Connect
  • 3+ years’ experience with Okta, OneLogin, PingIdenity or other SSO (SAML/oAuth/etc) Provider, preferably with provisioning into 3rd party SAAS applications
  • 3+ years as a systems engineer experienced in a highly-available production environment
  • 1+ year of experience with MFA
  • In depth knowledge of PKI elements such as X.509 certificates, PKI Elements and Hierarchy, Trust Models, Cross Certification, etc
  • Ability to build and design PKI in a complex environment
  • Scripting proficiency in powershell. Plus: Former experience as a developer programming in Java, C, C# etc
  • Knowledge application federation and provisioning including Box, Salesforce, Office 365, Slack, Confluence, Jira, and ZenDesk
  • Service monitoring and alerting expertise
  • Radius Experience preferred
  • Passion for music!
29

Senior Identity & Access Management Engineer Resume Examples & Samples

  • 5-7 years of experience in Enterprise Identity & Access Management services, preferably in a global environment
  • Deep understanding of Identity & Access Management solutions, architecture and industry best practices
  • Expert knowledge in integration of IAM technologies with diverse directories, infrastructures and application environments
  • Experience with Courion Identity Management suite (automating user provisioning, de-provisioning, onboarding & termination of all user types, entitlement reviews, role based access controls, self-service Identity Management)
  • Experience developing enterprise software, scripting, macro/query writing, software troubleshooting/debugging, and/or business analysis
  • Prior relevant experience with SQL including building queries, creating stored procedures, SSIS packages, tables, views & functions, as it relates to development within Courion
  • Development experience with JavaScript, VBScript, PowerShell, .Net, HTML as it relates to development within Courion
  • Expert Knowledge and practical experience with Identity Federation concepts such as SAML, OAuth, OpenID Connect, experience with integrating authentication for internal & partner applications with Federation services and single sign on
  • Ability to conduct research and provide technical recommendations for further enhancing the IAM toolset
  • Self- motivated, customer focused and operates with attention to detail
  • Proven analytical, evaluative and problem-solving capabilities
  • Ability to prioritize and execute on deliverables according to project deadlines, established service levels, and business needs
  • Understanding of project management principles and methodologies
  • CISSP strongly desired
  • Understanding of Regulatory Compliance Requirements such as PCI, SOX, Privacy Laws preferred
30

Identity Access Management Engineer Resume Examples & Samples

  • Design, implement, and support access management solutions
  • Must possess excellent communication skills (written, verbal) and have the ability and experience working effectively with technical and non-technical individuals alike
  • Security administration & support experience
31

Identity & Access Management Engineer Resume Examples & Samples

  • Responsible for deploying an enterprise identity management and access governance system supporting security and regulatory compliance, reduced IT support costs, and end-user self-service
  • Lead IAM projects and programs with overall technical responsibility in designing and integrating authentication, authorization, and auditing mechanisms within application architectures
  • Provide a global and consistent end-to-end solution to improve operational efficiency, and to drive high user adoption for every user facing component of the solution
  • Expert understanding of architectural principles
  • Expert understanding of security principles, specifically OS and directory services hardening
  • Expert technical knowledge of Identity and Access Management, Single Sign-On, and Federation. Advanced knowledge of LDAP, SAML, OpenID, Oauth
  • Strong understanding of Kerberos and cross-realm authentication concepts
  • Advanced knowledge of core PKI concepts and practices
  • Ability to program to solve problems and automate repetitive tasks in a common scripting or programming language
  • Drives interdepartmental discussions on matters relating to the technical architecture of identity systems and architecture
  • Facilitate systems/code reviews and provide a constructive environment for discussion
  • Work with leadership on project planning and resolution of systemic problems
  • Exercises expert judgment when making quality decisions on systems
  • Collaborates with vendors and the broader tech community on implementing solutions to bugs and code upgrades. Aware of business issues as they impact overall project plans
  • Expert understanding of the following: Java, JavaScript, JavaBeans, BASH, and/or shell scripting
  • NetIQ experience desired
  • High school diploma or equivalent required. Bachelor’s degree in a technology related field preferred
  • Usually requires 7+ years’ experience in designing and deploying Identity Management and Access Management solutions
  • Successful track record of driving complex projects to completion
  • Demonstrable track record of dealing well with ambiguity, prioritizing needs, and delivering measurable results in an agile environment
  • Experience designing and implementing high availability systems
  • Linux CLE, Linux RHCA or Novell CNIMA Certifications preferred
32

Identity Access Management Engineer Resume Examples & Samples

  • Hands on experience with IAM products(Aveksa, Sailpoint, Oracle IDM, IBM identity manager, ForgeRock, Ping identity, Courion, CA Identity)- Design and engineering experience, handling updates & patches
  • Understanding of Java & SOAP, with Powershell or other scripting languages to automate feeds and processes
  • Experience in a Unix/Linux environment with experience supporting SSO and SAML technologies
  • Implement and expand Identity & Access Management tool sets to their full potential
  • Perform updates to support all IAM tools within the environment
  • Develop strategic road maps for IAM systems and program
  • Triage and support operational issues involving IAM systems and tools
  • Automate manual tasks related to IAM systems and tools
  • Author technical documentation for all supported products
  • Prepare documentation for audits and act as the point of contact for audit related responsibilities
  • Performs other job-related duties as assigned or related to IAM technologies
  • Certified Information Systems Security Professional (CISSP) or Equivalent Preferred
  • Bachelor's degree in Computer Science or a related technology field or equivalent in comparable work experience within the technology field
  • Minimum of 6 years of experience in information technology and a minimum of 3 years of experience implementing Access Management solutions
  • Hands on experience with the implementation of Identity Management/Identity & Access Management products (i.e. Oracle, RSA, SailPoint, ForgeRock, etc.)
  • Experience with Java, SOAP, PowerShell, or other shell scripting
  • Experience in Linux and Windows system administration and security
  • Understanding of how to secure cloud-based solutions (e.g. PaaS, SaaS or IaaS)
  • Hands on experience with implementing and supporting SAML and SSO technologies
  • Architecture and/or engineering experience with LDAP and Active Directory
  • 10+ years' experience in the related technology fields
  • Excellent communication skills; must be able to interface with all levels
  • Open-minded, adaptable and passionate about learning
  • Excellent troubleshooting skills; must be able to think outside the box, troubleshoot non-standard/undocumented issues, and have an overall understanding of the products being supported
33

Identity & Access Management Engineer Resume Examples & Samples

  • Design and Implementation of standards and process for access enforcement, access governance, authentication, PKI, and directory services
  • Analyze, engineer, and implement highly complex enterprise level (global) Active Directory solutions including OU and GPO design/strategy
  • Provide input on new technology and ensure effective integration with other pieces of the technical infrastructure
  • Partner with IAM/Directory Services operations & architecture, as well as architects and engineers from connected technical teams
  • Coordinate with OS/App teams and provide guidance and L3 support for issue resolution as needed
  • Perform Active Directory responsibilities related to maintenance and growth of Active Directory
  • Participate in capacity planning, monitoring, and maintenance to ensure high availability of identity & directory services
  • Understanding of current IAM & Directory technologies with an interest in emerging technologies
  • Strong understanding of LDAP, Microsoft Active Directory, VDS, DNS, Group Policy, and Windows Server 2008/2012
  • Understanding of the latest concepts in secure Active Directory design, and current features of 2012 and upcoming server platform
  • Ability to engage in multiple projects & activities simultaneously while managing resources & priorities
  • Change focused: Actively seeks out process improvements to drive positive change with a sense of urgency
  • General understanding of information security concepts, networking, and operating system fundamentals
  • Ability to adapt and learn new technologies & processes quickly
  • Real world experience with Identity & Directory platforms and authentication technologies such as SAML, LDAP, Kerberos, NTLM, IBM ISIM, Sailpoint, Microsoft Active Directory
  • Experience with Active Directory, ADFS, IBM ISIM, Sailpoint, ADCS, Optimal, & Quest ARS
  • Programing/Scripting experience with Perl, Java, Powershell, and/or SQL
34

Identity & Access Management Engineer Resume Examples & Samples

  • Perform all responsibilities in accordance with BrightStar’s Competencies and Information Security policies and standards
  • Recommend and drive the enhancement process for the Identity Access Management (IAM) program
  • Deep knowledge of Identity and Access Management end-to-end lifecycle, from HR driven processes (on/off-boarding, conversions, transfer) to IAM compliance and role management
  • Architect/Design, build, and maintain an enterprise wide Identity Management solution
  • Perform comprehensive analysis regarding the processes and workflows in the identity and access management system to ensure the process and systems that are in place are working as they should
  • Working knowledge of a privileged access management with the ability to analyze, design, build PAM solutions, integrate applications and other services
  • Working knowledge various Role based Access Control (RBAC) solutions, role analysis, role structure and configuration
  • Initiate, plan and deliver provisioning process improvements in RBAC
  • Ensure attestations are mapped out correctly
  • Drive identity and access management fixes and enhancements
  • Manage the user lifecycle (New hires, terminations, transfers, LOA) through automation and integration with key systems
  • Working knowledge of the UNIX systems (i.e. Red Hat and CentOS), active directory, privileged access management, SSO and ETL, etc
  • Analyze and address issues related to performance, stability, scalability, and extensibility of the systems
  • Work across teams including Information Services, Information Security, and Business units to architect and build Identity and Access Management workflows and collectors
  • Consult with business units when implementing access levels for new systems
  • Create and maintain architecture for IAM systems
  • Perform additional duties as assigned
  • Ability to think with a security mindset. The successful candidate has a strong IT background with in-depth Identity and Access Management knowledge
  • Experience designing large-scale identity and access management solutions and operations
  • Experience designing and supporting IAM tools like Okta, Dell, SailPoint, or Oracle
  • Experience with a variety of IT Security and related technologies (e.g. SSO, ADFS, AADS, MFA, Federated Services, Adaptive Risk Based Authentication, etc.)
  • Excellent understanding of IT security and risk management, strategic planning and related tactical initiatives
  • Advanced skills in evaluating risk and communicating it in a fact-based manner
  • Advanced conceptual, organizational, analytical and problem solving skills
  • Self-directed technical lead, willingness to take ownership and drive results, propose technical directions, make decisions and resolve issues
  • Focus on effective decision making across the job requirements
  • Detail, quality, and customer-oriented
  • Able to lead junior team members and ensure their work product is in line with quality standards and expectations
  • 3-5 years of experience in Systems and Information Security administration with at least 2 years’ professional experience designing, implementing and supporting, enterprise Identity and Access Management programs
  • Thorough understanding of Information Security frameworks and best practices (e.g. PCI, SOX, ISO, NIST)
35

Identity & Access Management Engineer Resume Examples & Samples

  • Provide last tier support for operations and support teams, including root cause analysis and preventative analysis
  • Five years of experience in an IT environment with three years of experience managing and supporting projects
  • Experience with Microsoft Active Directory, X.509 Public Key Infrastructure Certificates and CRL, SCEP and Certificate Lifecycle Management tools
  • Understanding and experience with Cloud Identity as a Service such as Microsoft Azure Active Directory, Identity Federation protocols such as SAML2, WS-Federation, OAuth, OpenID Connect etc
36

VP-identity & Access Management Engineer Resume Examples & Samples

  • Enforce daily, weekly, and monthly Identity and Access Management (IAM) controls
  • Adherence to ISO standards and active involvement in process enhancement and development
  • Monitor controls and regulatory compliance required standards
  • Create, update, and maintain documentation (including process documents and procedures)
  • Provides detailed reporting on current state of IAM controls (i.e. KRI reporting)
  • Liaise with IT Security groups worldwide
  • Identify control gaps and recommended remediation and improvements for User Transfer and Exit process
  • Assist in user re-certifications, reconciliations, system profile review, third party applications validation, other IAM related reviews and in control process monitoring and continuous improvements
  • Support daily IAM BAU process and requests from user community as needed
  • Identify process and workflow improvements to address SoD violations
  • Minimum 3 - 5 years of professional IT / Audit / Compliance / Information Security / Risk Management related work experience
  • Experience in Identity and Access Management including the areas of controls and governance
  • Familiar with User Administration and Provisioning, Identity and Access Governance, and Identity Governance and Administration concept
  • Bachelor’s Degree in Computer Science or related field preferred
  • Strong understanding of Active directory, LDAP knowledge
  • Should have knowledge on Network and Infrastructure architecture
  • Ability to rapidly adapt to changing business requirements
  • Knowledge of Regulatory Compliance (SOX, FFIEC and 17A5)
  • Very knowledgeable with Risk & Control Self-Assessment (RCSA) and Capability Maturity Model Integration (CMMI)
  • Understands modern IAM methodologies and approaches
  • Understands Controls, Control Gaps, and Action Plans
  • Excellent written, verbal communication & presentation skills
  • CISA Certified
  • CISM Certified
37

Identity & Access Management Engineer Resume Examples & Samples

  • Architect, design and implement identity and access management solutions, including provisioning, certification, authentication, authorization and audit services
  • Develop processes, standards and automated solutions to govern identity services and simplify administration
  • Interface with stakeholders (e.g. auditors, controllers, HR, service providers, ...) to analyze requirements and design workable, cost-effective solutions
  • Provide L3 support for New York Life's I&AM services
  • Identity and Access Management Experience
  • Java Development
  • Windows and Linux
  • Scripting: *sh, PowerShell, Perl, Python
  • LDAP Protocol
  • Sailpoint, Courion or OIM
  • UnboundID/Ping Directory
  • Federation: SAML, OAUTH2, OpenIDConnect
  • Assets under management represent Consolidated Domestic and International insurance Company Statutory assets (cash and invested assets and separate account assets) and third party assets principally managed by New York Life Investment management Holdings LLC, a wholly owned subsidiary of New York Life Insurance Company
38

Senior Identity & Access Management Engineer Resume Examples & Samples

  • Configuration of the OIM suite of products – WebLogic, Oracle Identity Management, Identity Analytics, etc
  • Experience in full lifecycle implementations of OIM - requirements gathering, analysis, design, implementation, and support
  • Out of the box connector expertise in the following: Active Directory, SAP, RACF, O365, and ServiceNow
  • Light development work (Java) when required to bridge data/process, platform, or connector gaps
  • Integration analysis across diverse environments to determine best approach for integration with OIM
  • Workflow design and configuration based on documented approval and audit processes
  • Ability to develop documentation using best practice guidelines and policies
  • Experience working within an Agile development environment
  • Work with other application teams to resolve related issues
  • Candidate will be required to support production issues, troubleshooting, and application monitoring
  • Research of OIM issues and work with Oracle support for resolution
  • Partners with Infrastructure/Apps teams on OS, storage, network, upgrade, platform, etc. tasks
  • Available for on call rotational support for 3rd level support escalations
  • Bachelors Degree preferred in Information Systems, Computer Science, or equivalent
  • 5+ years overall experience in IT
  • 3+ years of hands-on experience supporting Oracle Identity Governance suite products
  • Extensive knowledge of Oracle Fusion Middleware with expert knowledge of Oracle Identity Manager
  • Experience in installation and configuration of Oracle Identity Manager, WebLogic, SOA and Analytics
  • Knowledge of Linux including Shell scripts coding, Windows including batch and power shells
  • Experience in Performance Tuning of WebLogic, SOA and other WebLogic Domains
  • Knowledge and understanding of Oracle databases
  • Experience in administration of user and role provisioning, connectors, workflow, certificate management, session management, encryption technologies, LDAP (MS Active Directory and OID), IT audit processes
  • Knowledge in Federation, SAML, OpenID, OAuth and other industry standard authentication/authorization solutions
  • Knowledge of load balancers, firewalls, proxies, LDAP, XML, SQL, JDBC, WebServices, Active Directory, SAML, and Oracle
  • Must have experience developing custom Java Web Services
  • Must have basic understanding and knowledge of PCI and SOX regulatory standards
  • Must be able to multitask, work independently as well as in a team environment
  • Must have excellent documentation skills
39

IS Lead Identity & Access Management Engineer Resume Examples & Samples

  • Troubleshoot complex application authentication issues for SSO infrastructure, LDAP and additional connected and related system issues
  • College degree or equivalent experience
  • 5+ years of experience implementing and improving identity management strategies
  • Strong organizational and interpersonal skills
  • Proven change agent who consistently delivers results
  • Experience with federation services, including SAML, Reverse Proxy, OAUTH
  • Experience with Identity Management Infrastructure, LDAP and connected systems, for example Micro-Focus (NetIQ) IDM and eDirectory
  • Understanding of UNIX / Linux operating systems
  • Understanding of the common UNIX and Windows utilities, diagnostic and monitoring tools
  • Familiarity with Privileged Identity Management Tools
  • Familiarity with multi-factor authentication
  • Familiarity with network protocols, LAN, WAN, SSL, Firewall, Load Balancer, and DMZ configurations
40

Identity & Access Management Engineer Resume Examples & Samples

  • This individual will be primarily responsible for testing, configuring, and setting standards and procedures, for client's Enterprise Directory, Web Access Management System (ISAM), and Identity Management System (ISIM)
  • This individual will provide guidance on integrating the identity management authentication and authorization framework into new and existing applications
  • In addition, this individual will share responsibility for the engineering of new security solutions as well as support for policies and standards already in-place
  • As one of the primary focus of the position is the development and implementation of the Web Access Management System
41

IS Senior Identity & Access Management Engineer Resume Examples & Samples

  • Collaborate with project teams and architecture to deliver on key initiatives
  • 3-5 years of experience implementing and improving user account provisioning, role provisioning and user access certification processes
  • 3-5 years of experience with IAM\RBAC related projects with identity and access management products
  • Experience with federation services, including SAML, Reverse Proxy, and/or OAUTH
  • Experience with configuring Single-Sign-On authentication schemes across a variety of access management and federation solutions such as Micro-Focus (NetIQ) Access Manger, Ping, SiteMinder, Sailpoint etc
  • Experience with Identity Management Infrastructure, LDAP and connected systems, including Micro-Focus (NetIQ) IDM and eDirectory
  • Solid Understanding of the common UNIX and Windows utilities, diagnostic and monitoring tools
  • Familiarity with Privileged Identity Management (PIM) Tools, such as CyberArk, Tycotic, or others
42

Identity & Access Management Engineer Resume Examples & Samples

  • Provide Operational support for Cloud Based Identity Services (CIS) providing Identity and Authentication Services to 8 Million users
  • Provide critical 7x24 support of Identity and Access Management Cloud Based Services
  • Provide Day-to-Day Operations of Incidents, problems, escalations as appropriate, and ensure root cause has been identified, and permanent fixes have been implemented
  • Ensures that Management and Incident Mangers are kept abreast of any outages
  • Coordinates Change controls between our Cloud based provider, client IT Customers, and Engineering teams
  • Follow all client Change Control processes
  • Ensure Freeze processes are followed, and Change conflicts are resolved and approved
  • Work with product vendor to coordinate distribution of regular updates/patches
  • Responsible for coordinating the deployment of new Cloud Identity software or solutions to client Cloud Identity environments
  • Responsible for reviewing and monitoring our SLA is being met by our Cloud Based Service Provider
  • Maintains strong customer relationship and build close working relationship with cross-functional teams
  • Work with various infrastructure support teams to provide technical direction and address security issues (NA Security Operations, Engineering, Cyber Security, Enterprise Vulnerability)
  • Monitor health of the Cloud based Identity Solution
  • Maintain documentation of all operational processes, procedures, and configurations
  • Familiarity with Web Service tools (e.g., Postman, SOAPUI, etc.)
  • Familiarity with SAML 2.0 flows (i.e., Service Providers vs Identity Providers, Service Provider vs Identity Provider initiated sign-on, etc.)
  • Familiarity with Web Traffic monitoring tools for troubleshooting access issues involving Web Services and/or SAML 2.0 endpoints (e.g., Fiddler, etc.)
  • Familiarity with PowerShell and C Libraries in relation to tooling automation
  • Ability to manage Support Outages, update management, and status across IT
  • Serve as Project lead or team member implementing Cloud Identity and Access Management solutions
  • Bachelor’s degree or equivalent in computer science or related disciplines
43

Senior Identity & Access Management Engineer Resume Examples & Samples

  • Identity and Access Management Engineer will drive continuous improvements and ensure delivery of routine maintenance, documentation and troubleshooting for the IAM environment in order to provide an exemplary customer experience within the organization
  • Support Identity & Access Management initiatives by taking responsibility for the effective deployment and usage of assigned resources including vendor resource and ensuring they are completed within planned timescales and resource estimates
  • Follow all set procedures and policies pertaining to the Change Management system
  • Stay abreast of the state-of-the-art through proactive involvement by making recommendations for conferences, training, and educational materials and attending same as appropriate when approved
  • The position may require being on-call during the week / weekend once or twice every 3 months
  • Practical experience deploying and managing enterprise-level privileged access management solutions
  • Thorough knowledge of basic security concepts, such as authentication, authorization, and auditing
  • At least 5 years in identity and access management for an enterprise network
  • Knowledge of Windows Server 2003/2008/2012, as well as Microsoft client operating systems (Unix/Linux knowledge beneficial)
  • Expertise with following network protocols: LDAP, DNS, DHCP, RADIUS, TCP/IP, Kerberos, NTLM
  • Experience with implementation and management of ADAM / AD LDS
  • Understanding of identity lifecycle solutions and experience with MIIS / ILM / FIM / MIM and T-SQL or similar competitor solutions
  • Experience with products from Quest: Intrust /Change Auditor, Reporter, Spotlight
  • Are considered as a plus
44

Identity & Access Management Engineer Resume Examples & Samples

  • Resolves problems with programs in the production environments. Analyzes programs to ensure that they efficiently use computer and storage resources; recommends appropriate changes as necessary
  • Conducts preliminary analyses of requirements for new or enhanced systems
  • Conducts preliminary analyses of cost/time requirements to determine the feasibility and scope of proposed projects
  • Develop, implement and maintain procedures to ensure a reliable and secure production environment
  • Work with company’s other support teams, service providers, and external vendors to implement and sustain the solutions
  • Assist in the rapid execution of information security initiatives by maintaining an appropriate level of prioritization, focus and persistence in an environment of significant change and growth
  • Ensure that service level objectives are delivered and meet stakeholder expectations for quality
  • Must be able to manage project task execution independently and get all associated team members to deliver their tasks on time, both with and without direct authority
  • Possesses a bias for action and avoids workplace distractions
  • Drives performance targets to completion
  • Has ability to interface with management on a regular basis
  • Must be self-motivated, work independently or as part of a team, able to learn quickly, meet deadlines and demonstrate problem solving skills
  • Bachelors Degree and 5 or more years of experience in the Project Management area
  • PMP
  • CISSP/CISA
  • Strong interpersonal, communication, and conflict resolution skills
  • Ability to lead project teams
  • Experience with Microsoft Office and project tracking tools
  • Bachelors of Science degree in Information Technology or related discipline
  • Experience with using Oracle Identity Manager or SailPoint or Site Minder or Okta or Quest One Identity Manager
  • Knowledge about the business processes to a level that is required to define solutions for the same in various IAM products
  • Minimum 3 years of experience on a technical team, preferably a software development team; experience should include development team oversight, and implementation of processes and metrics that improve team performance
  • Highly organized and thorough, with an ability to facilitate communication and scheduling among different levels of staff
  • Responsible for installation, configuration, troubleshooting, and on-going maintenance of software on UNIX/Linux environment
  • Familiarity with Agile/Scrum development methodologies
  • Experience in standard operating procedures to perform pre and post production support activities
  • Should have comprehensive knowledge of concepts of Incident, Change & Problem Management and experience of working on ticketing tools (e.g., Remedy, ServiceNow etc
  • Understanding of service level agreements and prioritization of incidents / enhancements
  • Strong analytical and customer service skills
  • Experience preferred in the following areas: Identity Management, Role Based Access Control, User Access Certification, Web Single Sign-on, Federated Identity
  • Excellent written communications skills which demonstrate the ability to draft clear, concise specifications, documentation and reports
45

Identity & Access Management Engineer Resume Examples & Samples

  • Develop and implement standards, process, and technology in support of ADPs global IAM program
  • Research and design best fit infrastructure and security architectures for IAM products
  • Proactively seek opportunities for process improvements, recommending and contributing to solutions by developing risk and opportunity plans
  • Participate in emerging trend research, product evaluations, and standards review
  • Modeling and mapping of enterprise assets for integration into IAM platforms for authentication & authorization
  • Develop strategy and solutions for expanding IAM services across the enterprise
  • Drive root cause analysis, support, and post mortem activity for security incidents and service interuptions
  • Work directly with key stakeholders, sponsors, and business partners to align business requirements & IT strategies for IAM
  • Take on additional tasks and responsibilities as identity services mature
  • Knowledge and experience with current IAM & IGA technologies with an interest in emerging technologies
  • Strong understanding of common IAM protocols and standards such as OATH, SAML, JWT, SCIM, RBAC
  • Strong understanding of Identity Lifecycle, SSO, & authentication models
  • Strong understanding of security concepts and best practices
  • Experience with provisioning & governance platforms, directory services, federation, & PKI
  • Strong quantitative, analytical, problem solving, and organizational skills
  • O Experience with ForgeRock, Activiti, or Brainwave GRC
46

Identity & Access Management Engineer Resume Examples & Samples

  • 5+ years IT security experience with basic expertise in information security administration systems and procedures
  • Preserves the integrity of Corporate Security by performing analysis of data, follow all Security policies and procedures which applies to all NYL owned equipment and systems
  • Work independent with minimal supervision, motivation and guidance
  • Serves as a resource to colleagues on security administration systems and processes
  • Possesses basic PC desktop software skills and working knowledge of MS Office, some ACF2/mainframe, Windows, Securid/Remote Access, management of powerful accounts and LDAP security administration
  • Demonstrate outstanding interpersonal skills and capable of some decision-making abilities
47

Identity & Access Management Engineer Resume Examples & Samples

  • Team member responsible for the execution of a strategic plan for Global Markets & Banking for Identity and Access Management in partnership with GIS
  • Contribute to the Global Markets & Banking Applied Engineering strategy across the organization and with the Enterprise functions; help build awareness of the strategy across LOB technology teams; ensure that key design & blueprints are understood across the organization
  • Help Implement innovative technology solutions that deliver foundational access management, resiliency and robust application capabilities and provide competitive business advantage while at the same time meeting aggressive regulatory reporting timelines
  • Partner with Enterprise functions to influence, and drive adoption of CTO, Enterprise Data, Global Business Continuity and other GT&O strategies; ensure that GBAMT in aligned to the Enterprise and that the Enterprise is responsive to GBAMT’s application platform requirements
  • Participate in the evaluation of emerging IAM, Automation & Application Platform Cataloging technologies, and make buy/build technology decisions
  • Life Cycle Management of IAM Patching, enhancements, etc
  • Expertise in Java programming, Weblogic, J2EE, SOAP, REST, JSON, and Service Oriented Architecture
  • Expertise in common IAM protocols and standards such as OAUTH and SAML
  • Partners with Technology and Business Unit control owners to serve as a security expert and trusted advisor in designing and providing systems that facilitate user provisioning/de-provisioning, authentication / authorization, and reporting based on business needs, industry best practices, and regulatory requirements
  • Significant experience in abroad range of Application Platform challenges (Resiliency, Identify & Access Management, Data Access (Entitlements), automation, best practices and standards, with a track record of delivering innovative technology solutions that enable the business and achieve simpler, more cost effective delivery of critical business applications
  • Experience in large transformation and organizations change programs