Identity Engineer Resume Samples

4.5 (109 votes) for Identity Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
SD
S Dietrich
Stone
Dietrich
3537 Darrion Road
Philadelphia
PA
+1 (555) 889 1005
3537 Darrion Road
Philadelphia
PA
Phone
p +1 (555) 889 1005
Experience Experience
Houston, TX
Identity Engineer
Houston, TX
Swaniawski, Harber and Monahan
Houston, TX
Identity Engineer
  • 25% Develop and implement custom workflows, sync rules, policy rules, and connectors to managed systems in the identity management system under the instruction of the Senior Identity Manager - 20% Assist the UNO community with identity management system related tasks - 10% Maintain identity management system, including databases and backups - 10% Maintain cloud sync server - 10% Write and maintain identity workflows according to SIM specs - 5% Patch identity management system - 5% Monitor system logs and sync activity - 5% Monitor cloud sync activity - 5% Collect feedback and ideas from UNO community on identity related workflows and policies - 5% Identify and fix data problems in UNO connected systems
  • 25% Develop and implement custom workflows, sync rules, policy rules, and connectors to managed systems in the identity management system under the instruction of the Senior Identity Manager
  • 20% Assist the UNO community with identity management system related tasks
  • Delivering service deployment and expansion, whilst working with stream leads in order to integrate Microsoft technologies via Azure and Office 365
  • Follows department processes and standards and may make recommendations to these
  • Provide excellent customer service to all areas of the Corporation; provide department interface with areas and groups within First American in support of Security Administration initiatives. Maintain strict confidentiality in all matters dealing with Information Security matters deemed confidential by management
  • Generates and creates reports; researches and analyzes data and report trends to Management
Chicago, IL
Senior Identity Lifecycle Engineer
Chicago, IL
Stroman-Kshlerin
Chicago, IL
Senior Identity Lifecycle Engineer
  • Provide 24x7x365 operational support of an enterprise level and highly complex Identity Lifecycle Management environment
  • Analyze data and identify trends to facilitate root cause analysis and identify opportunities for service improvement
  • Create and update standard operating procedure documentation
  • Manage the backup and restore of FIM, MIM and LDS
  • Migrate identity lifecycle management systems to an AWS cloud environment
  • Plan and implement highly complex changes to the environment
  • Support synchronization of identities between on-premises directories and cloud directories including Azure Active Directory and Office 365
present
Houston, TX
Identity Management Senior Engineer
Houston, TX
Aufderhar-Mertz
present
Houston, TX
Identity Management Senior Engineer
present
  • Establishing rules of behavior for interacting with managed directories
  • System and network management activities,
  • Engineering, development, implementation and support of Identity and Access Management and Role Based Access Control solutions,
  • Identity & Directory Management Services
  • Defining, developing, maintaining, and advising on the effective use of the Publix information technology architecture,
  • Problem management activities,
  • Group Policy management
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Towson University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good knowledge in VBScript, Powershell, HTML or ASP.Net
  • Previous directory experience (Windows 2008, 2012 R2 desirable), backup and recovery, troubleshooting, Kerberos authentication and firewalls
  • A knowledge of application integration with AD, Java, C#, C++ (beneficial)
  • Additional experience in Recovery Manager for AD, GPOAdmin, InTrust , Change Auditor and SCOM (desirable)
  • Knowledge of AD in a large, global organisation
  • Microsoft Certified Solutions Expert (MCSE) 2008 or 2012 or Microsoft Certified IT Professional (MCITP) 2008 and 2012 certified (beneficial)
  • Previous experience working with detailed documentation
  • AD Migration Experience, within a forest, from trusted forests or external entities
  • Experience of federation and cloud identity using ADFS and Azure AD
  • Previous experience of Windows Server 2008 and 2012
Create a Resume in Minutes

15 Identity Engineer resume templates

1

Identity Management Solutions Engineer Resume Examples & Samples

  • Gathering and clarifying requirements; collaborating with managers and lead engineers of the AIM team, broader technology partners in the Technology Division and Business partners in order to understand technical and business requirements that will drive solutions
  • Driving the design and implementation of solutions (large or small) using both openIDM and Morgan Stanley applications
  • Delivering design, code, perform testing, supporting production deployment and post production activities
  • Building strong relationships with other AIM teams namely, Enterprise and Web Authentication, LDAP and Identity Data
  • Helping to shape the overall technical strategy and roadmap for the IdM team
  • Excellent understanding of identity Management – Primarily identity administration and Password management
  • Prior experience with openIDM or another IdM product
  • Hands on experience with solution delivery using Java, Java scripting, Perl, REST, DB2, JSON, Web technologies (like Angular, Backbone, Bootstrap, Handlebars )
  • Development experience on Unix environment
  • Good knowledge/experience on LDAP, Active directory, Kerberos
  • Proven development experience in OO languages
  • Experience in delivering quality artefacts at all phases of SDLC
  • Ability to work with remote manager and distributed team
  • Understanding of password Synchronization methods
2

Identity Engineer Resume Examples & Samples

  • Managing the engineering and architecture for federated access to Software as a service (SaaS) applications via AD FS and Azure AD
  • Delivering service deployment and expansion, whilst working with stream leads in order to integrate Microsoft technologies via Azure and Office 365
  • Acting as an active directory subject matter expert whilst representing AD in required projects
  • Simplifying the current environment through migrations and technology enhancements
  • Ensuring regulatory compliance of solutions
  • Ensuring security compliance for AD and Azure
  • Driving risk reduction
  • Previous directory experience (Windows 2008, 2012 R2 desirable), backup and recovery, troubleshooting, Kerberos authentication and firewalls
  • Experience of federation and cloud identity using ADFS and Azure AD
  • A knowledge of application integration with AD, Java, C#, C++ (beneficial)
  • AD Migration Experience, within a forest, from trusted forests or external entities
  • Knowledge of AD in a large, global organisation
  • Previous experience of Windows Server 2008 and 2012
  • Microsoft Certified Solutions Expert (MCSE) 2008 or 2012 or Microsoft Certified IT Professional (MCITP) 2008 and 2012 certified (beneficial)
  • Good knowledge in VBScript, Powershell, HTML or ASP.Net
  • Additional experience in Recovery Manager for AD, GPOAdmin, InTrust , Change Auditor and SCOM (desirable)
  • Previous experience working with detailed documentation
3

Amazon Chime Identity Engineer Resume Examples & Samples

  • BS or Masters degree in Computer Science or related field
  • 5+ years of related work experience
  • Demonstrated experience with software testing methods, such as functional testing, stress testing, performance testing, and failure injection
  • Knowledge of data structures, algorithms, operating systems, and/or distributed systems
  • Ability to take raw product requirements and create software architectures and designs to bring them to life
  • Experience working closely with other developers to understand their needs and issues and to develop cooperative solutions
  • Demonstrated ability to mentor other software developers to maintain architectural vision and software quality
  • Experience with Java, JS and web UIs
  • Experience with authentication and authorization
  • Familiarity or experience building Enterprise software
  • Experience with building and operating large scale web services and backend systems
  • Experience in a DevOps environment with full ownership of code changes from development to production and monitoring
  • Familiarity with EC2 and AWS services
4

Identity & Infrastructure Engineer, SO&A Resume Examples & Samples

  • Report to IIE Technology Manager and be based out of our London technology office
  • Participate in technical solution delivery workshops
  • Deliver technical solutions based on IIE roadmap
  • Be required to work autonomously when required
  • Support senior engineers with automation and programmatic engineering of systems
  • Provide proactive support to the rest of the team
  • Be technical, hands on and an evidence based engineer when researching or troubleshooting
  • Be on call regularly and where required in a shift pattern, be available for occasionally scheduled weekend works
  • Provide up to date information to the line manager regarding problem resolution status and possible impact of issues on related systems and projects
  • Participate in research and design workshops for various technical projects
  • At times be required to travel to one of our international offices to carry out technical work
  • Take responsibility for supporting your changes all the way through to proving that they work well – and continue to work well – in production
  • Track the progress that you are making towards the wider goals of your team, and transparently communicate that progress to your team and Technology Manager
  • Cloud computing is a must for this role: AWS, Azure
  • AWS technologies: Cloudformation, Autoscaling, ELBs, S3 etc…
  • Advanced scripting skills: PowerShell and JSON
  • DNS, DHCP
  • Windows server 2012 R2
  • Active Directory, ADFS 2012 R2 and related technologies
  • Teamcity and Github
  • Good and clear communicator, oral and written
  • Ability to fit and work within a small team and individually when required
  • Be able to follow and implement specific technical instructions
  • Show ability and enthusiasm to learn new skills quickly and develop existing skills
  • Prepare and maintain internal computing systems documentation
  • Azure, Azure Active Directory, Microsoft Identity Manager
  • Desirably have proficiency in C# programming language
  • Build, configure and troubleshooting of Linux systems
  • Monitoring solutions such as Solarwinds
  • Jira and Confluence
  • Google Apps
5

Principal Engineer, Identity & Trust Resume Examples & Samples

  • 10+ years in a development role
  • Experience crafting, implementing and securing high-performance RESTful micro-services serving millions of requests a day
  • Prior experience implementing security, privacy, spam or identity management solutions at scale
  • Fluency in any modern programming languages (preferably Java or at least knowledge of)
  • Passion for collaboration and strong interpersonal skills
  • If preferred language is not Java, ideally you can code in any of the following languages: NodeJS, Python, Go
  • Familiar with Spring-boot framework or similar ones
  • Experience with AWS or similar cloud service platform
  • Experience reviewing complex protocol or system design
6

Netguard Identity Access Manager, &V Engineer Resume Examples & Samples

  • Developing test scenarios
  • Developing automated tests of REST APIs
  • Setup and debug of the test environment and equipment
  • Providing input into the verification test planning, test configurations, technical problem solution and reporting of progress during the verification cycle
  • Experience with testing REST APIs
  • Experience with test automation development
  • Excellent interpersonal/team skills
  • Experience debugging and troubleshooting skills in a multi-tiered environment/platform
  • Strong analytical and logical ability
  • Experience with agile development process
  • Familiar with Object Oriented Design
  • Working knowledge of Java
  • Code Repositories such as SVN, Git
  • IDE: Eclipse
7

Engineer Identity & Access Management for Americas Resume Examples & Samples

  • Run operations of Identity & Access Management infrastructure and supports problem solving for directories, applications and other solutions owned by the team, lead the problem management for reoccurring or complex issues
  • Contribute to the development of Identity & Access Management automation processes for support of daily operations and the gathering of directory performance information. As the technical expert, contribute technical idea according to the experience from daily operation
  • Support the definition of administrative processes and procedures and necessary documentation. Makes them understandable to others. Handle the process deployment, monitoring, maintenance and optimization
  • Manage the relationship with business and handle stakeholder communication; listen to business and bring feedback to directory service team discussion; attend business communication meeting to present directory service operation and project material; provide operation training to partners in site and business unit in accordance to the global standards
  • Provide an accurate analysis of business requirements and select the most appropriate solution to fulfill them
  • Based on personal expertise, review current Identity & Access Management solutions and propose improvements; participate to their deployment, and document them at all stages of evolution
  • The position may require participating on the defined shift schedules
  • Bachelor’s Degree in Computer Science or equivalent by experience
  • At least 3 to 5 years of relevant practical experience managing Directory Services, mainly MS Active Directory, in a large-scale organization (multi-domains)
  • Scripting skills: PowerShell, VBScript
  • Understanding of security concepts related to Public Key Infrastructures
  • Experience with implementation of backup / restore and disaster & recovery strategies
8

Identity Engineer Resume Examples & Samples

  • 25% Develop and implement custom workflows, sync rules, policy rules, and connectors to managed systems in the identity management system under the instruction of the Senior Identity Manager
  • 20% Assist the UNO community with identity management system related tasks
  • 10% Maintain identity management system, including databases and backups
  • 10% Maintain cloud sync server
  • 10% Write and maintain identity workflows according to SIM specs
  • 5% Patch identity management system
  • 5% Monitor system logs and sync activity
  • 5% Monitor cloud sync activity
  • 5% Collect feedback and ideas from UNO community on identity related workflows and policies
  • 5% Identify and fix data problems in UNO connected systems
  • 2 years of experience in programming or as a systems analyst
  • Master's Degree in Computer Science or related field
  • Experience working with Oracle and SQL Server databases
  • Experience with Human Resource Management systems
  • Experience with Active Directory and Microsoft Identity Manager
  • Experience with Visual Basic and Windows PowerShell programming
9

Identity & Access Management Role Engineer Resume Examples & Samples

  • Bachelor's degree preferably in Information Systems, Computer Science or related field
  • Min 3 years of experience in provisioning access profiles to various technology systems such as
  • CISM, CISA, or CISSP certifications preferred
  • Knowledge of cyber security standard frameworks such as ISO and NIST
  • Familiarity with identity management provisioning systems (Microsoft, Oracle, NetIQ) a plus
10

Senior Engineer, Identity Access Management Resume Examples & Samples

  • Actively learning the product/service space from team members and stakeholders
  • Applying rigorous engineering practices to solving the complex problems presented
  • Understanding athena’s coding conventions and development policies and applying them to their work and in their codechecks of others work
  • Understanding the system and devising solid test plans for code written
  • Teaching others on what they have learned, including writing appropriate technical documentation
  • Substantial expertise in a programming language such as Java or Python
  • Preferred skills include leveraging Open Source and Platform as a Service, full stack development, experience with AWS or Azure
  • Experience with platform development/identity management/access management a plus
  • Bachelor Degree or equivalent (CS degree preferred)
  • 4-8 years of professional experience
  • Great teamwork skills
  • Technical Skills: Demonstrate solid technical and engineering expertise by developing software to solve complex problems
  • Technical Skills: Demonstrates understanding of how athena’s products and how they fit together
  • Technical Skills: Demonstrates relentless and versatile learning, enjoys the challenge of unfamiliar tasks
  • Scope: Responsible for the design and delegation on a major project’s worth of work involving multiple releases with multiple people working on it
  • Autonomy / Decision Making: Executes independently of other developers, understands what and when to escalate, and comprehends balance between perfection and getting things done
11

Active Directory Identity Engineer Resume Examples & Samples

  • Excellent project management and organizational skills needed. Must have the ability to prioritize and estimate time needed to accomplish tasks
  • Experience working in a team-oriented, collaborative, virtual environment
  • Dynamic personality that can establish the appropriate presence within a virtual team meeting
  • Ability to work independently, on multiple projects at the same time, in a fast-paced environment
  • Must demonstrate excellent interpersonal, communication, and presentation skills
  • Strong writing and speaking abilities necessary to present complex technical concepts in a clear and compelling manner to various levels of technical and business audience
  • Ability to construct business requirements from non-technical conversations, translate them into detailed specifications, and then build efficient solutions based on those specifications
  • Makes independent decisions within the scope of defined job description
  • Seeks guidance as necessary for performance of duties
  • Proven analytical and problem-solving abilities
  • Must have strong documentation skills using Microsoft Word, Excel, Visio, Project, and PowerPoint
  • Microsoft SQL Server 2008 or later
  • Microsoft SQL Reporting Services
  • Visual Studio/C# 2013 or later
  • .NET 4.5 or later
  • Microsoft Windows and Windows Server
  • Strong Active Directory Engineering knowledge and skills
  • Experience working/engineering in large, highly complex AD environments
  • Technical Skills Considered a Bonus
  • Microsoft Forefront Identity Manager (FIM) 2010 R2
  • Entity Framework/LINQ
  • ASP.NET WebForms and ASP.NET MVC
  • SOAP and REST-based Web Services
  • Microsoft IIS
  • HTML5/CSS
  • Visual Studio Unit Testing
  • Microsoft Exchange 2010 or later
12

Identity Management Senior Engineer Resume Examples & Samples

  • Defining, developing, maintaining, and advising on the effective use of the Publix information technology architecture,
  • Designing access controls for a complex application,
  • System and network management activities,
  • Must have at least three years of recent experience with role based access design and reporting,
  • Must have at least two years of recent hands on development and/or maintenance experience with one or more of these products
  • Experience with JavaScript, HTML and XML programming,
  • Experience with database products (IBM DB2 UDB, Oracle or MS SQL),
  • Must have experience with Unix/Linux systems,
  • Provisioning and access governance experience with and understanding of security on systems such as Active Directory, RACF, Unix, SAP, Oracle, SQL Server, DB2
  • CISSP certification, and
  • Good understanding of the ITIL and MOF frameworks along with the incident, problem, and change management processes
13

Identity Management Senior Engineer Resume Examples & Samples

  • The IDMS Senior Systems Engineer will be responsible for the design, administration, management, execution and maintenance of identity and directory management services solutions that are implemented to meet the needs of enterprise users and the enterprise architecture
  • Identity & Directory Management Services
  • Password management, directory synchronization, single sign-on (SSO) capabilities including the use of Security Assertion Markup Language (SAML) 2.0
  • Electronic authentication and authorization for system access and transaction processing
  • Data canonicalization and standardization of disparate directories
  • The IDMS Senior Systems Engineer will also be responsible for the following
  • The Microsoft AD domain(s) Domain Name System (DNS) services across the enterprise for agency-wide end-user computing platforms for servers, desktops, laptops, and mobile devices
  • AD security policies
  • Permissions assigned to groups and users
  • Policies and procedures to address cleanup of rogue and/or orphaned objects within the domain
  • Access to the AD through multiple federation services
  • Application of new authentication encryption technologies (to include strong authentication, Public Key Infrastructure (PKI)-level encryption with smart cards and/or tokens, Multifactor Authentication, and One Time passwords)
  • PKI infrastructure and controls for supporting access and management services via service accounts
  • Highly available and redundant active directory and supporting services
  • Bachelor's Degree and 9+ years of eperience; OR, High School equivalent and 13+ years of experience
  • 8 + years experience in Identity & Directory Management Services design & operations
  • 5+ years experience with coding (such as C# or Visual Basic or Powershell)
  • 8+ years hands-on experience with IT Identity and Directory Management (create, change, delete user accounts, privileges, and roles) that includes management, administration, and support of Microsoft Active Directory (AD) domain structure
  • Candidate must possess, or be able to obtain, a US “Public Trust” clearance and eligible for Secret Clearance
  • 8+ years Windows 2008/2012 systems administration experience
  • Excellent interpersonal skills including the ability to collaborate effectively, self- awareness, and above average written and oral communications
  • Experience with the design and implementation of IT service management best practices such as change, problem, incident, configuration and service level management and/or ITIL is strongly preferred
  • Hands-on experience with SSO Protocols such as SAML, WS-FED, OAUTH, etc
  • Microsoft Certified Technology Specialist (MCTS), Microsoft Certified Solutions Associate (MCSA): Windows Server 2012, or Microsoft Certified System Engineer (MCSE): Server Infrastructure (SI)
  • Familiarity with Google Enterprise Apps internal directory service (GCIMS), use of Mailgate products with Google Mail
  • Familiarity with Splunk, ForgeRock, & AWS technologies
14

Amazon Chime Identity Engineer Resume Examples & Samples

  • Experience with SaaS, service-oriented architectures and web services
  • Proficiency with Java
  • Proficiency with IAM, LDAP, and Active Directory
  • Basic understanding of Identity and Access management protocols including oAuth, SAML, OpenID
  • Proficiency with other programming language such as Ruby or Python
15

Identity Access Management SSO Engineer Resume Examples & Samples

  • Extensive experience working with CA SSO SiteMinder (5 or more years)
  • Extensive experience working with an Identity Management solution, preferably CA IM (5 or more years)
  • Solid troubleshooting and problem solving skills
16

Identity Engineer Resume Examples & Samples

  • 25% Develop and implement custom workflows, sync rules, policy rules, and connectors to managed systems in the identity management system under the instruction of the Senior Identity Manager - 20% Assist the UNO community with identity management system related tasks - 10% Maintain identity management system, including databases and backups - 10% Maintain cloud sync server - 10% Write and maintain identity workflows according to SIM specs - 5% Patch identity management system - 5% Monitor system logs and sync activity - 5% Monitor cloud sync activity - 5% Collect feedback and ideas from UNO community on identity related workflows and policies - 5% Identify and fix data problems in UNO connected systems
  • Bachelor's Degree in Computer Science or related field - 2 years of experience in programming or as a systems analyst - Excellent written and oral communication skills
  • Master's Degree in Computer Science or related field - Experience working with Oracle and SQL Server databases - Experience with Human Resource Management systems - Experience with Active Directory and Microsoft Identity Manager - Experience with Visual Basic and Windows PowerShell programming
17

Senior Identity Lifecycle Engineer Resume Examples & Samples

  • Provide 24x7x365 operational support of an enterprise level and highly complex Identity Lifecycle Management environment
  • Troubleshoot and resolve high complexity issues and incidents
  • Migrate identity lifecycle management systems to an AWS cloud environment
  • Support synchronization of identities between on-premises directories and cloud directories including Azure Active Directory and Office 365
  • Participate in or lead complex or high severity troubleshooting and incident problem resolutions with other infrastructure teams or vendors
  • Plan and implement highly complex changes to the environment
  • Participate as a team member on projects involving Identity and Directory Services
  • Integrate new applications and attributes
  • Analyze data and identify trends to facilitate root cause analysis and identify opportunities for service improvement
  • Ensure the security and compliance of the environment
  • Create and update standard operating procedure documentation
  • Manage the backup and restore of FIM, MIM and LDS
  • Participate in capacity planning, performance monitoring and maintenance to ensure high availability and proactively identify opportunities for service improvement
  • High school diploma, GED or equivalent certification, or military experience
  • Minimum of 8 years IT experience
  • Minimum of 3 years Forefront Identity Manager (FIM) or Microsoft Identity Manager (MIM) experience
  • Minimum of 5 years of Identity Lifecycle Management technical experience that includes the operational support and implementation of complex, large-scale, enterprise level solutions
  • Proven experience effectively communicating technical issues
18

Identity & Access Management SSO Engineer Resume Examples & Samples

  • Design, implementation and administration of new and existing CA SSO and related infrastructure
  • Design, implementation and administration of new CA Identity Minder and related infrastructure
  • Design, implementation and administration of new UnboundID LDAP and related infrastructure
  • Develop and configure integration methodologies and practices for complex use cases with extensive customization
  • Work with various teams involved with different aspects/phases of the application lifecycle
  • Provide CA SSO/IDM/LDAP SME (subject matter expert) level support to operations teams for both development and production environment. This will include occasional after-hours for escalated production issues
  • Design and develop provisioning and de-provisioning processes / workflows for accounts across various internal and external systems / expose TEWS functionality
  • Work with security and compliance teams to provide auditing and reporting facilities and processes
  • Work with Operations to deploy, automate and integrate new technologies into the current environments
  • Work with Architecture, Development, and Business teams to identify CA SSO and IDM functionality that can be enabled and integrated to improve security or performance
  • Hands-on experience with LDAP (CA Directory and UnboundID preferred), SAML 2.0, Active Directory, Java and J2EE applications
  • Experience with one or more of the following IAM products: Oracle Access Manager, IBM TAM, OpenSSO, SailPoint, Oracle Identity Manager
  • Experience with some or most of the following web and application servers: WebSphere, JBoss, Tomcat, Apache, IHS, IIS
  • Experience managing complex directory service environments on a global scale
  • Experience administering Unix/Linux servers
  • Experience writing and debugging Unix/Linux shell and Perl scripts
  • Experience writing and debugging interpretive web-based code
  • Experience working in PCI/SOX controlled environments
19

Identity Engineer Resume Examples & Samples

  • Owns in IAM platform implementation and provides advice to operational support personnel as well as stakeholders outside of the IAM team
  • Drives gathering information for identifying business process requirements and related provisioning solutions for a specific business need
  • Identifies IAM problems, researches alternatives, tests to confirm, and implements solutions for defined business processes
  • Creates documentation of technical provisioning/deprovisioning requirements and functions
  • Generates and creates reports; researches and analyzes data and report trends to Management
  • Participates in evaluation and selection of new IAM technology
  • Resolves provisioning/deprovisioning problems to obtain operations across all platforms including email, files transfer, multimedia, teleconferencing, etc
  • Provide excellent customer service to all areas of the Corporation; provide department interface with areas and groups within First American in support of Security Administration initiatives. Maintain strict confidentiality in all matters dealing with Information Security matters deemed confidential by management
  • Works on problems of moderate scope where analysis of situations or data requires a review of a variety of factors
  • Exercises judgment within defined polices standards and procedures to determine appropriate action
  • Follows department processes and standards and may make recommendations to these
  • Achieves set objectives
  • Negotiates, persuades, and gains consensus from implementation team on assigned objective
  • Errors may cause provisioning/ deprovisioning or significant project delays
  • Works under general supervision of more experienced team members
  • Actively contributes to the results of a team and works towards achieving team goals and objectives
  • Uses expertise of more senior level team members and leverages additional resources to confirm solution or explore customized applications as a solution
  • No responsibility for the supervision of others
  • Must have minimum 3 years in experience performing user administration in a Windows Active Directory environment
  • A general knowledge and understanding of underlying components and technologies of an IAM platform such as proxies, application servers, web protocols, XML and HTTP, and networking principles
  • Must have 2+ years’ experience with networking, VPN, PKI,; Identity management and encryption technologies
  • Experience in implementing Information Security technologies and/or processes
  • Experience using administrative tools and working knowledge of MS Active Directory, Exchange, DNS, DHCP, TCP/IP
  • Experience in Exchange administration; creating and maintaining mailboxes, distribution lists, contacts and public folders
  • Experience performing user administration tasks for various in-house and 3rd party applications
  • Experience with Distributed File System (DFS)
  • Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements
  • Experience with remote access: Remote Desktop and Virtual Private Networks
  • Strong analysis and reporting skills with two or more years in an IT or business environment performing similar or related job duties
  • Excellent organizational and follow through skills, sound judgment and strong independent decision making skills; ability to effectively perform multiple tasks simultaneously
  • Advanced knowledge of MS SharePoint, PowerPoint, Excel, Word, Visio, and Project
  • Understanding of project management methodologies
  • Ability to work effectively with all levels of the organization
20

Engineer Identity / Access Management Resume Examples & Samples

  • Minimum of 1-year experience or equivalent course work in administering applications, system services, or Java based applications in a Unix environment
  • Minimum of 1-year experience or equivalent course work installing, configuring and managing technical systems related to identity, access control or security services. (A minimum of 7 years' experience to be considered for the Senior level.)
  • Minimum of 1-year experience or equivalent course work developing applications or system services that interact with relational data models and data query languages such as SQL or PL/SQL
  • Minimum of 1-year experience or equivalent course work in programming in languages such as Perl, Java, PL/SQL, or Unix shell scripting
  • Knowledge of or the demonstrated ability to learn modern developer frameworks such as continuous integration and continuous development within the first 12 months of employment. Prefer experience in Jenkins and Docker
  • Knowledge of client/server communications protocols such as TCP/IP
  • Knowledge of directory services protocol (LDAP) or Microsoft Active Directory environments
  • Demonstrate the ability to analyze, laterally and creatively think, take initiative, provide logical reasoning, be persistent, and work with other team members to problem solve
  • Knowledge of service-oriented architectures and design patterns, including SOAP and REST-based web services
  • Excellent teamwork and issue resolution skills
  • Demonstrated customer service and relationship management experience
21

Directory Engineer / Identity Management Resume Examples & Samples

  • Align identity and access management processes with business processes and identify required governance and policy needs
  • Integrate new and existing policies and technical controls for user authentication
  • Guide and perform access data cleanup
  • Performs systems modeling, simulation, and analysis to Identify, analyze, and resolve system problems
  • Supports the stand up of necessary system software, hardware, and equipment (physical or virtual) to meet changing infrastructure needs
  • Maintains, upgrades, and supports existing systems and infrastructure to ensure operational stability
  • Develops logical and physical technology documentation on new or existing systems
  • 5+ years of experience in engineering, building, configuring, operating, supporting, and maintaining identity and access management infrastructure
  • Experience with Microsoft applications and technologies, such as
  • Microsoft BitLocker Administration and Monitoring (MBAM)
  • Microsoft Advanced Group Policy Management (AGPM)
  • Microsoft Distributed File System (DFS)
  • Microsoft Distributed File System Replication (DFSR)
  • Microsoft Forefront Identity Manager (FIM)/Microsoft Identity Manager (MIM)
  • Microsoft Unified Access Gateway (UAG)/Microsoft Web Application Proxy (WAP)
  • Active Directory Federated Services (ADFS)
  • Microsoft File/Print services
  • Knowledge of Single Sign On Federation products using SAML 2.0 and other technology. Products such as Oracle IAM and Microsoft ADFS
  • Experience with multi factor authentication
  • Working knowledge of Group Policy Objects, and their application to meet DoD security hardening requirements
  • Ability to script in PowerShell
  • Excellent understanding of Directory services to troubleshoot all escalated issues
  • Excellent writing skills with a proven background in writing documentation, presentations and policy
  • Experience with AD in conjunction with Windows 10 and Server 2016 is a plus