Identity Management Engineer Resume Samples

4.8 (105 votes) for Identity Management Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity management engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MR
M Rice
Marlene
Rice
1162 Sigurd Freeway
Houston
TX
+1 (555) 124 0768
1162 Sigurd Freeway
Houston
TX
Phone
p +1 (555) 124 0768
Experience Experience
Los Angeles, CA
Identity Management Engineer
Los Angeles, CA
Kautzer, Kiehn and Rosenbaum
Los Angeles, CA
Identity Management Engineer
  • Assist in capacity planning and performance management of supported services/technologies
  • Analyze, document and recommend process improvements for Identity Management processes
  • Assist in problem resolution for Identity Management infrastructure and integrated applications when necessary
  • Develop, maintain, and execute processes and procedures in support of routine administrative tasks
  • Assist in the support of other Identity Management infrastructure services/technologies as necessary
  • Establish strong relationships with client representatives and project managers
  • Develop long-term secure solutions that manage authentication and security across the enterprise
Boston, MA
Senior Identity Management Engineer
Boston, MA
Nicolas-Braun
Boston, MA
Senior Identity Management Engineer
  • Provide Subject Matter Expertise for the design and support of the Single Sign-on implementation
  • Contribute to the design and implementation of the overall Identity Management program
  • Establish work flows and processes to effectively and efficiently manage the identity lifecycle for employees, contractors, business partners, and consumers
  • Maintain the health and operational effectiveness of security systems and tools
  • Fully support the deployment of Single Sign-on technology throughout the enterprise from systems design through operational turnover
  • Consult with various application areas to integrate authentication processes with the enterprise standards
  • Ensure full integration of technologies with enterprise processes (change management, incident management, problem management, monitoring, etc.)
present
New York, NY
Principal Identity Management Engineer
New York, NY
Bins, Lubowitz and Weimann
present
New York, NY
Principal Identity Management Engineer
present
  • Manage engineering solution development from design to implementation
  • Prepare manuals and train workers in use of new forms, reports, procedures or equipment, according to organizational policy
  • Provide extensive technical support to other Technical Services departments and user organization on IAM Provisioning and De-Provisioning related technical issues
  • Configure SailPoint IIQ system leveraging out-of-box and custom integrations of the toolset with end user systems and applications to accomplish Provisioning, De-Provisioning scenarios for internal and external users
  • Provide leadership in migrating existing non IDM system based user life cycle management workflows into chosen Identity and Access Management Solutions for Business to Employees, Business to Business and Business to Consumers scenarios
  • Work with Change Management functional groups to follow processes and effectively communicate to end users on usage of IAM integrations, automation and user interface through Job Aids and other complementing methods
  • Work with the Identity Management manager to implement the programs and processes as agreed to by Infrastructure leadership
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Portland State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Demonstrated ability to work under pressure, possess good written and oral communication skills, attention to detail, and be self-motivated
  • Coding and Scripting knowledge such as, Java, XML, C#, Visual Basic, Powershell
  • Detail-oriented with strong conceptual, analytical, problem solving, decision making and planning skills
  • In depth knowledge of share, file, and folder permissions in Microsoft Windows
  • Ability to analyze business processes to improve security assurance posture of the department
  • The ability to use utilize application, scripting and operating system commands to configure, debug, and monitor large scale production systems
  • General knowledge of Microsoft Exchange
  • Ability to work independently to achieve departmental objectives
  • Knowledge of modern development lifecycles, including Waterfall, Agile and iterative development
  • In-depth knowledge of account management in Microsoft Active Directory
Create a Resume in Minutes

15 Identity Management Engineer resume templates

1

Identity Management Engineer Resume Examples & Samples

  • Understanding the JPMC Global Identity/Access Management policies and best practices, and designing and implementing the Chase Commerce Solutions Privileged Access and Break Glass strategies and technologies necessary to achieve regulatory and audit compliance in a flexible, responsive fashion
  • Managing, monitoring, enhancing, maintaining, and upgrading all corporate infrastructure components needed to deliver Enterprise Password Vault/Application Identity Management services
  • Ensuring the Password Vault is designed and managed for scalability and continuous availability
  • Working with internal service customers wanting to integrate with Enterprise Password Vault/Application Identity Management for account Password Vaulting and Password Retrieval services
  • Participate in audit activities as they pertain to Privileged Account Password Management and Usages for both internal and external audits
  • Identify risks as it pertains to Privileged Account Password Management within Chase Commerce Solutions and ways to reduce those risks
  • Provide regular reporting on the coverage, compliance, and usage of privileged accounts to internal customers and auditors
  • Monitor work queue for incoming requests from internal service customers
  • Monitor trouble ticket queue for incidents and work to resolve
  • This position will hold the primary support responsibility and requires participation in 24 x 7 On-Call rotation
  • Minimum of 5+ years experience with enterprise level design and system management skills including designing mission critical, fault tolerant solutions with continuous availability (Windows/*NIX)
  • Minimum of 5+ years experience in most of the following products: Active Directory, LDAP, Unix Operating Systems, Native
  • Minimum of 3+ years with SQL Scripting and Bash/Korn Shell Scripting
  • Minimum of 3+ years experience managing Authentication (Account Administration) or Emergency Access solutions including Active Directory
  • Demonstrates an understanding of modern cryptography and data encryption concepts
  • Familiar with Java codes, Informatica, Citrix, BOKs Access Control (KeON), RADIUS, and/or OVMS and TANDEM
  • Demonstrates an understanding of Identity and Access Management (IAM) and related concepts
  • Demonstrates an understanding of process-focused methodologies to structure IT related activities (Change Management)
  • Experience supporting application services within hierarchical/secure network environments over a Wide Area Network and behind or between firewall controlled network zones
  • The ability to use utilize application, scripting and operating system commands to configure, debug, and monitor large scale production systems
  • Proficient in multiple business disciplines/functions
2

Identity Management Engineer, Junior Resume Examples & Samples

  • 1+ years of experience with software development
  • 1+ years of experience with UNIX or Linux
  • 1+ years of experience with requirements, design, implementation, integration, and testing
  • 1+ years of experience with Agile development
  • Experience with PKI, authentication and authorization services, and identity and access management
  • Experience with directory services
  • Experience with Attribute Based Access Control (ABAC), Role Base Access Control (RBAC), or Policy Based Access Control (PBAC)
  • Experience with implementing standards, polices, and guidelines of specific COTS tools and design patterns needed to implement Dynamic Access Control
  • Knowledge of the access control locations and types, including information objects, applications and Web services, network perimeters, and network devices, and implementation approaches
  • BA or BS degree in CS, Information Systems, Engineering, or a related field preferred
3

Identity Management Engineer Resume Examples & Samples

  • Function as technical expert for single sign on services. The current products are RSA Access Manager and RSA Federated Identity Manager; future state/technologies to be determined
  • Assist in problem resolution for Identity Management infrastructure and integrated applications when necessary
  • Develop, maintain, and execute processes and procedures in support of routine administrative tasks
  • Assist in capacity planning and performance management of supported services/technologies
  • Define and maintain appropriate controls and documentation ensuring compliance with regulatory and audit requirements
  • Develop, maintain, and execute processes and procedures to ensure ongoing Disaster Recovery Readiness
  • Participate in on call rotation for support of production Identity Management infrastructure, coverage 24x7x365
  • Assist in the support of other Identity Management infrastructure services/technologies as necessary
  • At least 4 years of2 + years experience administering a single sign on solution: CA Single Sign-On (aka SiteMinder), RSA Access Manager/ Federated Identity Manager, Tivoli Access Manager, or equivalent required
  • Thorough understanding of SAML and Integrated Windows Authentication
  • Experience configuring web systems (IIS, Apache, Tomcat, etc.) to integrate with SSO products
  • Experience with administration and operations of production systems in a large scale environment
  • Experience with RSA Authentication Manager (SecurID) a plus
  • Experience with RSA Data Loss Prevention Suite a plus
  • Experience with LDAP directories and Active Directory a plus
  • Familiarity with UNIX and scripting (perl, vbscript, shell, java) plus
4

Identity Management Engineer Resume Examples & Samples

  • Architecture, Implementation, Integration, unit testing and support of the Bank’s Identity Access Management infrastructure
  • Plans and evaluates IAM platforms, creates technical specifications, develops and unit and basic integration testing according to specified requirements
  • Provide detailed deployment and support documentation around components developed. Maintain documentation relevant to operations (operation manual, installation guide, etc.)
  • Own and resolve application/solution issues. Problem analysis, technical investigation, and resolution of support queries and escalations
  • At least 5 years IT experience, 2-3 years in Information System Security
  • Work experience (Implementation, Administration or Development) in at least one of the above CA products
  • Minimum of 2 years working with Unix, Windows or Database servers
  • Five or more years developing and supporting security solutions for Identity Management and Access control
  • Experience of integrating commercial off-the-shelf IAM solutions into a banking environment
  • Experience of engineering, configuring and deploying highly available enterprise solutions (load balancing, clustering, replication, geographical failover etc.)
  • Hands-on experience in CA IDM Connectors and its implementation is extremely desirable
  • Programming/debugging skills: Unix Shell, Perl, Java, JavaScript
  • Experience with the following: web servers: IIS, Apache, or IBM HTTP Server
  • Experience with the following application servers: WebSphere, JBOSS, or WebLogic
  • A solid understanding of web-based technologies including multi-tier applications and security standards (SSL, HTTP, Cookie Handling, SAML, WS-Security)
  • A solid understanding of RDBMS and Directory Services (LDAP, in particular Active Directory) including system architecture, configuration, and monitoring
  • An understanding of security issues, application-level security, encryption, vulnerabilities
  • Excellent communication (written and verbal) and interpersonal skills, is able to articulate to non-technical and technical audiences
  • Reliable time management and organization skills, demonstrates effective management of multiple concurrent projects with high attention to detail
  • A deep understanding in Identity and Access management principals, methodology, and solutions including access control (role-based and discretionary), authentication, authorization, provisioning, approvals, and workflows
  • Maintain expertise on security trends and best practices through training, research, and development in order to mitigate potential security exposures
5

Identity Management Engineer Resume Examples & Samples

  • BS/BA in Computer Science or related computing intensive field, plus 5 years of experience, or: Master`s degree in Computer Science/MIS or related computing intensive field, with 2 years of experience
  • 5+ years’ work experience developing enterprise level software
  • Demonstrated experience successfully engineering, deploying, and maintaining complex enterprise information systems in large (>5000 clients) production environments
  • Demonstrated experience successfully implementing source control systems (e.g. CVS) and engineering process models (e.g. CMM) in both development and production environments
  • Demonstrated experience successfully documenting and communicating engineered solutions for audiences of all levels
  • Must have strong interpersonal and problem solving skills, and be highly self-motivated and organized
  • Authentication, Authorization, and Access experience with at least one of the following
6

Senior Identity Management Engineer Resume Examples & Samples

  • Provide Subject Matter Expertise for the design and support of the Single Sign-on implementation
  • Contribute to the design and implementation of the overall Identity Management program
  • Provide consultation to business and technology partners on security requirements and recommended authentication integration patterns
  • Establish work flows and processes to effectively and efficiently manage the identity lifecycle for employees, contractors, business partners, and consumers
  • Maintain the health and operational effectiveness of security systems and tools
  • Provide mentorship and coaching to less-experienced members of the information security team
  • Fully support the deployment of Single Sign-on technology throughout the enterprise from systems design through operational turnover
  • Consult with various application areas to integrate authentication processes with the enterprise standards
  • Develop technologies, processes, workflows, and practices required for full identity lifecycle management (provisioning, de-provisioning, recertification, audit) across multiple platforms and applications
  • Ensure full integration of technologies with enterprise processes (change management, incident management, problem management, monitoring, etc.)
  • Serve as a Subject Matter Expert for CA Siteminder, RSA SecurID
  • Support other identity management technologies such as SailPoint Identity IQ and Microsoft AD
  • Define security requirements, establish baselines and measure compliance, based on applicable laws, regulations, and accepted practices
  • Consult and collaborate with enterprise leadership and technical staff to develop the corporate information security strategy and architecture
  • Respond to and recover from technical and process failures for identity management systems
  • Increase corporate awareness of information security through training and communication
  • Communicates technical and risk assessment results, evaluates engineering and integration initiatives and provides advanced technical support to assess security practices, standards and guidelines
  • Reviews and recommends the installation, modification or replacement of hardware or software components
  • Identifies and addresses any configuration change(s) that impact enterprise risk profile
  • Position may require on-call coverage for evenings, weekends, and holidays
  • Broad IT infrastructure knowledge across server platforms, networking, and application infrastructure
  • Scripting and/or programming experience
  • Knowledge of threat and vulnerability and/or risk management processes and technology
  • Broad security product knowledge
  • Strong project management skills; working knowledge of group infrastructure
  • Experience in leading/motivating large, diverse workforce; must be able to build camaraderie/trust
  • Fortune 500 experience
  • Technical skills across a broad range of computing platforms and network protocols
  • Experience in several of the following technologies: Firewalls, Intrusion Prevention, Vulnerability Scanning, Data Loss Prevention, Email Security, Endpoint Security, DNS, Web Content Filtering, SEIM, AV, Certificate Authority and encryption
  • Understanding and experience with IP address space management, subnetting, name resolution, and directory service protocols and be able to participate and guide future network LAN/WAN planning and implementation
  • Familiarity with common security models and regulations such as ISO 2700X, SOX, HIPAA, GLBA, NERC, and PCI
  • Ability to support both internal and external audits
  • Experience in the areas of change control, problem management, incident management troubleshooting of security solutions
  • Ability to multi-task and work on multiple projects at one time
  • Ability to communicate both written and verbally
  • Required to use motor coordination with finger dexterity (such as keyboarding, machine operation, etc) most of the work day
  • Required to exert physical effort in handling objects less than 30 pounds rarely
  • Required to be exposed to physical occupational risks (such as cuts, burns, exposure to toxic chemicals, etc) rarely
  • Required to be exposed to physical environment which involves dirt, odors, noise, weather extremes or similar elements rarely
  • Normal setting for this job is: office setting
  • MSJA*
7

Senior Identity Management Engineer Resume Examples & Samples

  • Develop and implement web-based applications supporting security, compliance and application teams across GE Power
  • Provide technical leadership in a fast paced and agile development environment
  • Work across functions and team boundaries to define, design, and implement software solutions for web based programs
  • Work with program leadership to ensure that the software deliverables are consistent with the goals of larger programs or initiatives
  • Work with Product Owner and/or Product Line Leaders (PLL) to understand requirements & vision
  • Lead impact assessment and decisions related to technology choices, design / architectural considerations and implementation strategy
  • Expert in core data structures as well as algorithms and has the ability to implement using language of choice if required
  • Write code that meets standards and delivers desired functionality
  • Design and develop optimized and reliable code per specifications
  • Demonstrate leadership in communicating business goals, programs, and processes
  • B.Sc. or equivalent education with a focus on system engineering or computer science from an accredited institution
  • Minimum 3 years of experience working hands-on with Core Java and HTML5, Javascript, CSS, Angular JS, SpringBoot, Cache / session management, CSS Preprocessor, JQuery, Build and Package management, and infrastructure experience (application, web and database layers hosted on cloud solution)
  • Experience developing applications on the following databases: NOSQL, Oracle MySQL, PostGres, etc
  • Experience designing and developing applications using REST APIs (Akana), Single Sign-on (SAML, Open ID), Informatica and WebMethods integrations
  • Excellent knowledge of development tools and integrated build systems: Eclipse IDE, Jenkins/Hudson, Maven - software development lifecycle and automated testing experience (TDD/BDD)
  • Proven track record of applying tools and methodologies to ensure code quality, continuous integration, code reviews, and test-driven approach, including coverage tracking (SAST/DAST testing, SCABBA)
  • Experience with analytics and reporting tools including Adobe Analytics and Tableau (or similar)
  • Experience in auto deployment and code repository management
  • Must demonstrate exceptional independent debugging and problem-solving
  • Experience leading technical discussions with customers to identify appropriate specifications
  • Passion for software architecture and clean code
  • Urge to drive continuous improvement
  • Exposure to Predix
  • Excellent understanding of distributed applications and service-oriented architectures
  • Knowledge of data structures, algorithms, and software engineering principles
8

Identity Management Engineer Resume Examples & Samples

  • Work with the Identity Management manager to implement the programs and processes as agreed to by Infrastructure leadership
  • Work with various business leaders to define and establish the access levels and methods to be used in the chose toolset
  • Manage the tools and technology needed to implement the chosen solution
  • Ensure that the implementation of the programs and procedures conforms to industry standard best practices
  • Remain up to date on the features offered within the chosen toolset and how they can be used at Brunswick
  • Excellent customer service skills are required. Must be able to deal effectively with a variety of customers in a demanding and service-oriented climate
  • Must be organized, detail oriented and able to complete work in a timely manner with a high degree of accuracy
  • Technical experience is preferred
  • JavaScript or bean shell, XML preferred
  • Proficiency with LDAP preferred
  • Familiarity with Azure Cloud, OID, AD, ADFS and SAML technologies preferred
  • A Bachelor Degree or higher is required
  • 3-5 years previous IT experience
9

Senior Identity Management Engineer Resume Examples & Samples

  • As an expert in Microsoft Identity Manager and other related technologies (such as Active Directory) take responsibility for ensuring the full user management lifecycle (create, modify, suspend, remove, etc.) is executed reliably and based on defined security policies and principles
  • Run operations of the Identity Management infrastructure and support problem solving for directories, applications and other solutions
  • Develop the Identity Management automation processes for support of daily operations and the gathering of directory performance information. As the technical expert, contribute technical ideas according to the experience from daily operation
  • Integration of Microsoft Identity Manager into a variety of other platforms – some using out-of-the-box management agents (such as SQL server) and in other cases custom development of management agents
  • Support Identity Management initiatives by taking responsibility for the effective deployment and usage of assigned resources including vendor resource and ensuring they are completed within planned timescales and resource estimates
  • Provide performance measures such as operational and technical reports
  • MSCE \ MCITP qualification
  • Microsoft Identity Manager training/certification
  • ITIL Foundation level training / certification or conceptual understanding
  • 5 - 7 years of solid hands-on experience in Identity management systems and services (Active Directory, identity management solutions)
  • Detailed knowledge and working experience with
10

Identity Management Engineer Resume Examples & Samples

  • Proactively implement, update, maintain, and monitor digital IDs across multiple business units and domains
  • Frequently exercise discretion and independent judgment whether system or access level changes meet regulatory and statutory compliance requirements
  • Provide general troubleshooting of access related issues
  • Perform reviews and re-authorization of access
  • Design, develop, document, analyze, test, and/or modify new software systems part of the Identity Management Toolset; including SailPoint LifeCycle Manager and Okta
  • Maintain exceptional level of detail and provide accurate record keeping
  • Ensure department SLA’s are met and reporting KPI to Management is performed on a regular basis
  • Work with users and developers to analyze requirements of software applications to bring them into request process, IDM, and Certs
  • Immediately notify management and designated business contacts of any suspected breach or contravention of security policies and practices
  • Contributes to Enterprise Information Security team effectiveness by accomplishing additional security related tasks as needed
  • Assist auditors as needed to ensure compliance
  • Perform regular maintenance of application data, documentation, and record keeping data
  • The Identity Management Engineer will independently review access requests and determine the need for additional authorization, and will recommend the refusal of access to their management based on policy and practices
  • The Identity Management Engineer will perform their duties under minimal supervision, exercising autonomy to review and fulfill their duties within the scope of their position
  • Bachelor’s Degree in IT field or equivalent experience
  • Fundamental understanding of Microsoft’s Active Directory structure including Organizational Units, User Accounts, Group Memberships, and access rights
  • Demonstrated ability to work under pressure, possess good written and oral communication skills, attention to detail, and be self-motivated
  • Excellent writing and verbal communications skills
  • In-depth knowledge of account management in Microsoft Active Directory
  • In depth knowledge of share, file, and folder permissions in Microsoft Windows
  • Ability to analyze business processes to improve security assurance posture of the department
  • Ability to work independently to achieve departmental objectives
  • Understanding of operating system level security and user access audit logging
  • Some experience with account management within Unix
  • General knowledge of Microsoft Exchange
  • Fundamental knowledge of SOX/PCI/PII regulations
  • Coding and Scripting knowledge such as, Java, XML, C#, Visual Basic, Powershell
11

Identity Management Engineer Resume Examples & Samples

  • Provide hands-on engineering, analysis and systems integration to implement federated authentication and authorization, application onboarding, and PKI-related projects and programs
  • Provide Tier 2 and Tier 3 service desk support for Federation and PKI services
  • Work with clients to securely onboard new applications
  • Conduct information gathering meetings with clients to identify their operational and security requirements
  • Develop solutions and recommendations including timelines, benefits, and risks for each solution
  • Develop solution architectures, models, and designs to meet the client’s operational and security needs
  • Implement practical, cost-effective solutions applying state-of-the-art federation and PKI technologies
  • Establish strong relationships with client representatives and project managers
  • Align tasks with desired outcomes and expectations
  • Assist the Project Manager in identifying, tracking, and reporting status on issues, challenges, and risks
  • Ability to interface with various levels of leadership
  • Experience supporting large enterprise service operations
  • Capable of managing multiple projects simultaneously
  • Detail oriented, the ability to multi-task with good time-management skills
  • Strong communications (written and oral), and interpersonal skills
  • Experience with Active Directory / Microsoft Windows Server 2003 through 2012R2
  • Experience with Active Directory Federation Services (ADFS)
  • Experience with Card Management Systems such as Active Identity
  • Experience in applying PKI technology to business systems
  • Knowledge and understanding of identity federation and claims-based authentication
  • Knowledge and understanding of authentication methods, standards and protocols (Kerberos, SAML, OAuth)
  • Solid understanding of requirements for NIST SP 800-63 Levels of Assurance 1 through 4 (LOA1, LOA2, LOA3, LOA4)
  • Current Active Security Clearance
  • Experience with Identity Management Systems such as Radiant Logic Virtual Directory System (VDS)
  • Experience with Entrust Certificate Authority
  • Smartcards in thin client and VDI-based contexts
  • Leveraging PKI authentication certificates for multiple domains
  • PKI for mobile device contexts
  • PIV-derived certificates for mobile device contexts
  • Understanding of NIST 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials
  • Typically requires Bachelor’s Degree in Information Technology or related field and 7 - 9 years of related experience
  • DOJ experience and Microsoft Technical Certifications are preferable
12

Identity Management Engineer Resume Examples & Samples

  • Possess good working knowledge in SailpointIQ System, Active Directory, Java and Web Based Technologies
  • Manage the user lifecycle (joiners, movers, leavers) through automation and integration with key systems
  • Experience in tools such as Sailpoint, Service Now, or other identity management systems preferred
  • Good understanding of information security principles and IT infrastructure including operating systems, applications, communications and network protocols
  • Good understanding/working knowledge of the UNIX/Linux systems, active directory, privileged access management, ETL, etc
  • Evaluate and address issues related to performance, stability, scalability, and extensibility of the systems
  • Work across teams including Information Services, Information Security, and Business units to architect and build IdM workflows and collectors
  • Preferred (Optional)
13

Senior Identity Management Engineer Resume Examples & Samples

  • Establish an IT system and advise on the installation, configuration and upgrade of servers in line with policy and system requirements
  • Test, install, configure and upgrade new and existing application software to ensure optimal performance
  • Advise on and establish policies and procedures that govern the creation and maintenance of user accounts and perform the necessary access restrictions and verifications in line with security breaches and identity statuses
  • Develop and implement a back-up and recovery policy to enable system restoration and minimal disruption in the event of a hardware, security or administration failure
  • Perform system monitoring and analysis and performance tuning to identify problems or areas of improvement and formulate potential solutions
  • Manage security permissions within the system and within systems to which it is connected by ensuring that network security measures are implemented
  • Conduct research and development to improve IT Services and Business functions
  • Generate system reports and design custom reports to document the systems environment
  • Effectively manage an IT Systems Administration team, their resources, development and overall performance
14

Systems / Identity Management Engineer, Mid Resume Examples & Samples

  • Knowledge of LDAP and identity federation
  • Experience with deploying, configuring, and managing enterprise identity management solutions with Active Directory
  • Experience with designing, implementing, and managing group policy solutions, remote server management, and high–availability for Active Directory
  • Experience with developing and managing scripted solutions using PowerShell
  • Ability to work independently and as a team member to solve difficult technical challenges on a global scale
  • Microsoft Certified Solutions Associate (MCSA) in Server 2012 and Server 2012R2 or Microsoft Certified Solutions Expert (MCSE) in Server 2012 and Server 2012 R2 Certification
  • PMP or ITILv3 Certification
15

Systems / Identity Management Engineer, Mid Resume Examples & Samples

  • Experience with designing, deploying, managing, and configuration identity management solutions using Active Directory under Windows 2008, 2008R2, 2012, and 2012R2
  • Knowledge of LDAP protocol and identity federation
  • AA or AS degree and 6+ years of experience with IT systems administration and engineering, including responsibilities related to maintaining high systems availability and secure systems posture, such as patching and maintenance or BA or BS degree and 4+ years of experience with IT systems administration and engineering
  • Experience in designing, implementing, and management group policy solutions, remote server management, and high-availability for Active Directory
  • Microsoft Certified Solutions Associate (MCSA) in Server 2012/Server 2012R2 or Microsoft Certified Solutions Expert (MCSE) in Server 2012/Server 2012 R2
  • PMP-ITILv3 Certification
16

Principal Identity Management Engineer Resume Examples & Samples

  • Manage engineering solution development from design to implementation
  • Effectively work with the architecture team, business owners and other stakeholders for requirement gathering and integration needs into IAM Solutions
  • Prepare manuals and train workers in use of new forms, reports, procedures or equipment, according to organizational policy
  • Provide extensive technical support to other Technical Services departments and user organization on IAM Provisioning and De-Provisioning related technical issues
  • Configure SailPoint IIQ system leveraging out-of-box and custom integrations of the toolset with end user systems and applications to accomplish Provisioning, De-Provisioning scenarios for internal and external users
  • Provide leadership in migrating existing non IDM system based user life cycle management workflows into chosen Identity and Access Management Solutions for Business to Employees, Business to Business and Business to Consumers scenarios
  • May be assigned as a Technical Leader that require technical project management of existing or new integrations into IAM Technology Stack
  • Apply in-depth technical knowledge and expertise in IAM areas to arrive at decisions and problem resolutions that are complex and technical in nature. Provide guidance on technical engineering aspects of IAM conforming to evolving business needs
  • Work with IAM Operations group to understand opportunities to automate provisioning needs in the existing environment and migrate into IDM Solutions
  • Work with Change Management functional groups to follow processes and effectively communicate to end users on usage of IAM integrations, automation and user interface through Job Aids and other complementing methods
17

Senior Identity Management Engineer Resume Examples & Samples

  • Works in a team environment to optimize the identity management environment to ensure scalability, repeatability and reliability
  • Works with managers and customers in the business to understand business requirements, enterprise standards, and other considerations which influence how IAM solutions and services should function
  • Demonstrates thorough knowledge of all IAM provisioning and fulfillment processes in use throughout the enterprise
  • Engineers solutions to ensure that IAM services and processes meet the needs of the enterprise and comply with information security requirements
  • Supports, improves and documents existing IAM processes and procedures
  • Maintains process documentation as processes changes are implemented
  • Demonstrates thorough knowledge of IT security, compliance, and Identity Management
  • Analyzes and tests performance/operational impact of new technologies, processes, and changes to existing systems, and assists in documenting the functional requirements and technical specifications for new solutions
  • Resolves operational technical support issues, providing timely communication of downtimes, application problems, and facilitating resolution in technical areas using language and technical details appropriate for audience
  • Performs systems analysis in support of design efforts by team, and conducts integrated system testing of all system functions and interfaces
  • Participates in the coordination and scheduling of systems implementation and maintenance
  • Maintains up-to-date system configuration documentation, including internal training materials for supported areas
  • Provides frontline support as part of project go-live, working with customers to support end users
  • Creates and maintains Product Specifications, Change Management Documents and additional technical documentation
  • Works with QA/QC teams to perform quality control and quality assurance activities such as developing and executing test plans and scripts for IAM solutions or enhancements
  • Works with IAM Operations, IT support, and applications teams to ensure identity management technologies and solutions meet their needs and requirements
  • Works directly with IAM Provisioning Analysts and Supervisors to automate tasks which have proven to be standard and repetitive, or where automation may remove variability and recurring human error
  • Interprets customer and IAM Operations needs and documents IAM technology and process enhancement requests for improvement projects
  • Contributes to evaluation, selection, and configuration of IAM products, services, and processes
  • Identifies opportunities and outlines action plans to improve existing IAM solutions and processes
  • Implements role management solutions, technologies, and processes to enable the enterprise to effectively manage roles
  • Documents all engineering and functional changes as IAM solutions and technologies are managed through lifecycle
  • Has working knowledge of scripting languages and bulk processing tools in support of IAM operations
  • Works independently to deliver solutions on time
  • Designs and integrates IAM systems with in-house and third party applications for access provisioning, identity management, authentication, and authorization
  • Resolves deviations and exceptions identified by quality control and quality assurance
  • Resolves issues identified by audit findings or security vulnerabilities
  • Bachelor’s degree or four years of related education, experience, or training, in a distributed computing, healthcare, or customer service environment (or a combination of education and experience)
  • Four years Minimum experience in an access control/security related position that had similar primary duties in addition to education requirements
  • Formal education or training in server and/or application development, administration and optimization
  • Experience in administration and operation of at least one Identity Management technology/system (including in-house systems or scripts)
  • Experience with a database application programming environment
  • Demonstrated ability to lead others or manage projects through completion
  • Skilled at time management, and strong written and verbal communication
  • At least three current professional or technical certification relevant to position (preferred)
  • One certification specific to IAM or security applications (preferred)
  • Prefer Epic certification or other healthcare application certification
18

Identity Management Engineer Resume Examples & Samples

  • Collaborate with the team regarding emerging platform technologies, IAM roadmap and long-term strategy recommendations
  • Analyze, document and recommend process improvements for Identity Management processes
  • Participate in the development, maintenance, and support required for full Identity lifecycle management across multiple platforms and for account provisioning and management services
  • Develop long-term secure solutions that manage authentication and security across the enterprise
  • Participate in technology solution implementations, upgrades, enhancements and conversions
  • Evaluate engineering and integration initiatives and provide advanced technical support to assess security practices, standards and guidelines
  • Provide advanced technical support for complex issues
  • Excellent organizational skills and the ability to see solutions to their conclusion
  • Ability to be self-directed and a fast learner and flexible to support new technologies and legacy applications
  • Ability to react to high-pressure dynamic changing environments
  • Web technologies – AngularJS, Web APIs, RESTful services, TypeScript
  • Languages - C#, C++, Java, PowerShell, SQL
  • OS platforms – Windows, Linux
  • Preferred experience in the following disciplines
  • Bachelor’s Degree in Computer Science or related field of study
  • 5 years’ experience working in Information Technology preferred
19

Identity Management Engineer Resume Examples & Samples

  • A four year computer science or related technical degree or equivalent work experience is required, a minimum of 5 years of related work experience
  • Knowledge of Identity Management concepts (e.g. - authentication, authorization, user management, federation, LDAP, etc.)
  • Experience using Microsoft Identify Integration Server (MIIS)
  • Experience using LDAP and Microsoft Directory Services (e.g. Active Directory, ADAM)
  • Strong understanding of ISAM, PingFederate and security related protocols such as OAUTH and SAML
  • Scripting experience with SQL, PowerShell, or Ansible
  • Knowledge of Active Directory, Lightweight Directory Services, Web Services, Web and Application Services, Java and .NET technologies, and cloud services (including SAML, OpenID, OAuth, etc.)
  • Background in Identity Governance Life Cycle (IGLC) support
  • Understanding of cloud security, AWS
  • Breadth of knowledge across many technology disciplines
  • Ability to convert complex information into simple, explainable solutions
  • Understanding of current and future business needs met by infrastructure platforms
  • Results-driven with a bias towards practical applications
20

Single Sign-on / Identity Management Engineer Resume Examples & Samples

  • You will consistently maintain high quality software code, responsible for testing and validating all development and integration items, responsible for migrating integrations/solutions between various Broadridge environments (Dev, QA, Prod) during the designated change windows including nights/weekends
  • You will also be responsible for solving any issues reported with the environment or solution/integration and will follow change management procedures
  • You possess the ability to understand business requirements and implementation needs to successfully complete an implementation of Identity Management-related technologies
  • A Bachelor's Degree in Computer Science or an equivalent field along with 4+ years of excellent Java development experience is desired
  • We seek 3+ years of direct hands-on experience with Identity Management technologies including development, provisioning and configuration
  • We seek solid experience working with Web development and User Interface design is desired
  • You have strong hands-on development experience in Java/J2EE, Web Service and RESTful service technologies. Moderate hands-on experience with .Net technologies is preferred
  • You possess experience in HTML, HTML5, CSS, JSON, XML, Java Script, Ajax, Angular, JQuery and others
  • You are knowledgeable on WS-Standards and protocols such as SOAP, JSON, XML, WSDL and others along with working knowledge of WebSphere and Eclipse IDE
  • You bring a deep understanding of application resiliency and application security with a solid grasp of application performance issues
  • Ability to work on multiple assignments simultaneously and ensure design and coding are adhering to security, architectural and documentation standards
  • You have a strong understanding of a development organization and the SDLC cycle
  • Deep understanding of change management procedures/protocols and documentation
  • Strong verbal and written communication skills are desired
  • Flexibility to work during the designated change windows including nights/weekends
21

Senior Identity Management Engineer Resume Examples & Samples

  • User Access Review (UAR)
  • O Understand and support technologies that implement the UAR functions, such as Saviynt, CA compliance manager, and Oracle compliance manager
  • Experience with application identity management topologies
  • Experience with role based access controls
  • Strong Project and Time Management skills
  • Strong customer service and communication skills
  • Experience in Information Security or Compliance related services
  • Understanding of one or more control frameworks such as NIST, HIPAA-HITECH, SSAE 16, PCI, HITRUST, ISO 27001, etc
  • Knowledge of product and development security practices
  • Knowledge of system, network, and architecture security best practices
  • Able to exercise professional judgment within defined policies and procedures
  • 2+ years’ experience on ETL (extract, transformation, loading) tools from IBM, SAP or Informatica
  • Experience with identity management concepts and components such as web access control, provisioning, password synchronization, federation, and meta-directory
  • Experience in Risk Assessment, audit, and IT security assessments
  • Familiar with healthcare, privacy, or financial compliance regulations and IT and security frameworks and standards
  • Firm understanding of REST API and HATEOAS (Hypertext As The Engine Of Application State) architectural style