What are the responsibilities and job description for the Senior IAM Engineer position at capgemini?
The Sr. IAM Engineer will be responsible for the analysis, implementation, maintenance, and assist with design of all layers of IAM applications, which includes Authorization/Authentication/Accounting, Identity and Account Creation/Management/Provisioning. This role will also handle Role-based Access Control (RBAC) configuration and management, Single Sign On implementation, Process Improvement, Process Automation, IAM Break/Fix and IAM Enhancements. The IAM Engineer will work with other members of team, and manager, to ensure compliance with Franchise World HQ standards for security, privacy, and accessibility as defined by the Information Security Team. In addition, engineer will lead and direct the implementation of a new IDP tool in Subway's environment, OKTA.
Project Work:
- This includes the setup of new configurations and baselines around IAM within the IDP. This includes conditional access policies, RBAC, new SCIM setup, new governance
- Initial set up and configuration of a new IDP solution (OKTA) with an ability to perform architecture diagraming that will be used as the benchmark for future efforts. Utilize best practice frameworks and maturity models to set the future growth of the program as a whole
- Manage technology projects and system activities
Operations:
- Aligns with Industry best practices and establishes Subway policies and procedures accordingly
- Design and implement sustainable solutions to be used for authentication, authorization, user life-cycle management, role-based access control, privileged account management (PAM), audit and monitoring.
- Develop and oversee the implementation of Information Security Procedures and Policies relative to Identify
- Design and implement appropriate security controls to identify vulnerabilities and risks for access to systems and applications
- New SSO setup, IAM incident resolution and root cause analysis, complex onboarding/offboarding, upgrades/patching, change tickets, MFA management, group and access cleanup, audits, HR downstream changes, tool management, etc
- Conduct investigations and audits of identity gaps and vulnerabilities and evaluate the implications
- Collect business and functional requirements in Identity and Access Management area
- Establishes IDM and Directory related standards
- Reviewing service/application logs
- Partner closely with Information Security
- Experience with ticketing tools such as ServiceNow
- Participate in team on-call rotation for production support
Continuous Improvement:
- This involves modernization and optimization of the IAM program as a whole to a higher-level maturity. Improving upon SCIM, further automation of workflows, introducing new industry standard functions (such as password less authentication), improve identity lifecycle, conditional access policies, RBAC flows, etc.
- Manage and improve policies to improve our risk framework while performing vulnerability remediation to guide the improvement initiatives
- Assess the quality of controls and use performance indicators to create an action plan to fill gaps
Skills & Experience:
- Bachelor's Degree Preferred Computer Science, Information Technology, Information Security. Cyber Security - OR- Related Experience Preferred.
- 8 year's experience in information security, infrastructure.
- 5 year's experience in IAM, PAM, ZTNA and security governance.
- 5 year's experience in PowerShell scripting.
- 5 year's experience in Active Directory/Azure Active Directory.
- 5 year's experience in Microsoft Exchange.
- 3 year's experience as an OKTA Certified Administrator.
- 3 year's experience in setting up and/or managing APIs.
- Strong understanding of PKI, encryption, certificate management, tokenization.
- Experience setting up/managing SCIM, RBAC, SSO, MFA to the IDP.
- Experience in Azure Active Directory and Active Directory, OKTA or similar IDPs required (Saviynt, etc.)
- Database and API data parsing with PowerShell experience.
- Experience with cloud computing services such as AWS and Azure for the purpose of SCIM and managing access a plus.
- Querying languages such as SQL against tools such as Splunk or Dynatrace. Rapid7 desirable.
- GPO creation best practices.
- Authentication Server Software.
- Experience with risk management data and analysis.
- Strong problem-solving and communication skills.
The pay range that the employer in good faith reasonably expects to pay for this position is $33.75/hour - $52.73/hour. Our benefits include medical, dental, vision and retirement benefits. Applications will be accepted on an ongoing basis. Tundra Technical Solutions is among North America’s leading providers of Staffing and Consulting Services. Our success and our clients’ success are built on a foundation of service excellence. We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic. Qualified applicants with arrest or conviction records will be considered for employment in accordance with applicable law, including the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Unincorporated LA County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: client provided property, including hardware (both of which may include data) entrusted to you from theft, loss or damage; return all portable client computer hardware in your possession (including the data contained therein) upon completion of the assignment, and; maintain the confidentiality of client proprietary, confidential, or non-public information. In addition, job duties require access to secure and protected client information technology systems and related data security obligations.
Salary : $34 - $53