Kindly share some matching resume to *[email protected]
<[email protected]>*

*Job Title: Identity & Access Management Architect*

*Location**: King of Prussia, PA*

*Duration**: 12 Months*



*The Client is seeking an Identity and Access Management (IAM) architect
that will work closely with business and application leaders to define,
implement, and provide continuous improvement within the IAM
infrastructure.*



*Requirement**:*

*Educational Qualifications:*

Ø  Bachelor’s degree is required.

Ø  Educational concentration in a computer-based discipline (e.g. Computer
Science, Information Systems) or a technical discipline (e.g. Engineering,
Mathematics) is preferred.

Ø  Master’s Degree is preferred.

*Experienc**e:*

Ø  10+ years of experience in Identity and Access Management working within
an applicable function that directly aligns with the specific
responsibilities for this position.

Ø  Sailpoint implementation and support experience is strongly preferred.

Ø  Pharma/Biotech or similarly regulated environment experience preferred.
This individual must provide thought leadership and help build out the
Identity and Access Management (IAM) roadmap.

Ø  IAM domain experience in areas such as identity management,
provisioning, authentication, authorization, certification/governance,
monitoring along with experience in security best practices.

Ø  Strong experience with Rest Web services, SAML 2.0, Sailpoint
IdentityNow and IdentityIQ, OAuth, WS-Security, Public Key Infrastructure
(PKI) and other authentication/authorization protocols.

Ø  Candidate should have experience in designing IAM and SSO architectures

Ø  Development skills scripting, packaging, provisioning approvals, IAM
workflows and role-based access control Java/J2EE programming experience in
designing, coding, testing and implementing large enterprise applications

Ø  IT Security Industry certifications (CISM, CISSP, CISA, etc…) preferred

Ø  Excellent communication, interpersonal and leadership skills.



*Responsibilities:*

·         This position is responsible for defining the business use of
enabling IAM technologies such as Single Sign-On, and core Identity
Management products and related infrastructure to add value to the business
and improve corporate information security.

·         This role will contribute to the development of enterprise
security application standards, strategies and plans; and on eliciting
requirements and delivering solutions according to identified business
needs in collaboration with various stakeholders.

·         This role will provide technical oversight and guidance and lead
the technical implementation, and support the adoption and on-going use of
Identity and Access Management application systems while adhering to Client
governance standards.

·         This role is also primarily responsible for contributing to the
definition and maintenance of a functional, reliable, and cost effective
technology environment for the areas assigned and for identifying
improvements as appropriate.

·         The individual in this role is expected to work independently on
projects and problems of complex scope and may coordinate the activities of
others as needed.

·         This individual should have “hands on” skills and may perform
some development/scripting activities as new IAM connectors are established
across additional corporate applications



*Analyzing and Defining Requirements*

·         Responsible for working across business and BT teams to analyze
and define requirements for additional IAM integrations.

·         Accountable for the elicitation and analysis of business
requirements in collaboration with various stakeholders and effectively
translates these into functional requirements of the target solution.

·         Identifies and establishes scope and parameters of systems
analysis to define outcome criteria and measure-taking actions. Leads and
coordinates a team utilizing internal and external resources to deliver
systems analysis and solution design.

·         This position is expected to mentor other IAM and security
analysts to drive industry best practices.

*Drafting and Designing*

·         Accountable and responsible for identifying the IAM design,
developing script or technical connectors, and preparing the required
system design documentation (architectural specifications, diagrams and
charts, functional and configuration specifications) to ensure the
visualization of the technical implementation of user requirements, and to
provide direction to system programmers.

·         Collaborates with Infrastructure specialists and directs as
appropriate to deliver the target technology environment.

·         Implements the design by means of configuration and software
development using internal and external resources.

·         May perform peer reviews of design solutions or coding as a means
to further develop standards.

*Testing and Validation*

·         IAM is GxP compliant system, therefore, the role will be
responsible for the compilation of validation planning in agreement with BT
Quality to ensure proper system validation with all necessary
pharmaceutical regulatory agencies.

·         Controls and monitors the implementation of the defined measures
in the validation plan.

·         Prepares test cases and coordinates test reports in collaboration
with other departments adhering to Client defined quality and governance
standards and procedures.

·         Collaborates with Process Owners/Business stakeholders to ensure
test applicability.

·         Coordinates or conducts system functional testing with internal
or external resources as appropriate.

·         Responsible for contributing to the identification of enterprise
standard approaches to testing and validation applicable to the Client
framework.



*Training*



·         Supervises the development of IAM training materials and user
manuals.

·         Contributes to the development of these manuals as necessary.

·         Designs and conducts user training sessions, with emphasis on
relating the configuration and technical setup to the business requirements
and defined Client enterprise application standards.

·         Leads in the development of enterprise standard approaches to
Identity and Access Management Training as applicable to the Client
Security Framework.



*Operations and Support*



·         Accountable for the ongoing operation and maintenance of
applications for the assigned IT functional areas, including the definition
and monitoring of the measures to ensure system availability.

·         Accountable for the effective and efficient provision of 2nd or
3rd level incident support, change management, and maintaining the upkeep
of technical records and documentation.

·         Proactively communicates the status of ongoing daily support and
problem resolution.

·         Ensures effective problem analysis and resolution of issues of
complex scope in a timely fashion and escalates issues when needed to
appropriate levels of IT or Business.

·         May provide off hours support as it relates to the IT functional
area.



*Project Work*



·         Defines or leads an IAM project team for large, complex, business
critical projects.

·         Performs matrix roles as assigned for local and global projects
in areas within and outside core area of proficiency.

·         Defines scope, plans and manages projects involving all aspects
of the technical solution including data verification, migration, design,
implementation, and quality assurance.



*Teamwork and Leadership*



·         Leads by example in working collaboratively with internal
employees, vendors, and consultants to effectively implement solutions.

·         Develops and maintains mutually productive relationships in the
workplace.

·         Leverages a network of key contacts within and outside the
Technology area for the benefit of the team.

·         May contribute to the definition and planning of team targets and
strategy and coordinate the activities of others to deliver these.

·         May contribute to departmental budget and resource planning.



*Innovation*



·         Directs and conducts research and analysis on new and innovative
solutions, releases, enhancements and considers their applicability to
Client.

·         Keeps abreast of current technologies, associated strategies and
professional concepts as it relates to the assigned IAM functional area.



*Maintain Regulatory Compliance*



·         Effectively follow global IT procedures and policies are followed
consistently as defined by our Quality Management System (QMS).

·         Follows the appropriate global regulatory guidelines and current
Good Manufacturing Practice (cGMP).



*Strategic*

·         Contributes to the development of enterprise-wide technical
strategies, designs, and plans that support Business strategies and the
development of the Application Portfolio.

·         Works constructively to support changes to policies, procedures
and standards relating to the enterprise application landscape.

·         May define or manage coding standards for Development.

·         Is responsible for managing relationships with Application
vendors in alignment with Client stakeholders.









*Regards,*

AMIT KUMAR  *Sr. Recruiter*

*IDC Technologies Inc.*| *1851 McCarthy Boulevard, Suite 116, Milpitas, CA
, USA, 95035*

*408 668 8348 **I **[email protected]* <[email protected]>*
I Gtalk: Recruiter.amitk | Skype: Amitiilm*

*Web: **www.idctechnologies.com* <http://www.idctechnologies.com/>

"Under Bill s. 1618 Title III passed by the 105th U.S. Congress this mail
can not be considered spam as long as we include a way to be removed from
our mailing list. Simply send us an e-mail with REMOVE in the subject and
we will gladly REMOVE you from our mailing list."

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to