*Dear,*

*Hope you are doing well…..*

*Please send resumes to **[email protected]* <[email protected]>



*ROLE*

*Identity Access Management Architect*

*LOCATION*

*Columbus OH*

*DURATION*

*LONG TERM*

*RATE*

*$85/HR ON C2C*

*CLIENT*

*DIRECT*

*INTERVIEW TYPE*

*In-Person Only*

*State Experience Highly Preferred*

*U.S. Citizens and those authorized to work in the U.S. are encouraged to
apply*

*Note: For H1 While submitting I need consultant I 797 OR ID Proof.*

*Required Skills *

·      Bachelor’s degree with a minimum of 8 years of information security
or information technology experience or High school diploma or GED with a
minimum of 12 years of information security or information technology
experience

·      4 years’ experience in a lead role of a large scale complex Identity
Management implementation involving Microsoft FIM.

*4 Years of experience in the following Areas *

·      Experience developing and running multiyear, complex technology
initiatives and programs in a large enterprise environment.

·      Exceptional communication and interfacing skills with technical and
non-technical audiences.

·      Track record of garnering executive level sponsorship and support
for large scale technology programs.

·      Proven ability to influence people across the enterprise to adopt
changes to the current security and technical environment to optimize
functionality, efficiency, and availability.

·      Familiarity with compliance regulations and IT and IS frameworks and
standards.

·      Proven consulting and relationship management skills and the ability
to leverage key working relationships with business units, vendors, and IT
staff.

·      A proven ability to articulate recommendations effectively to
customers, vendors and management with varying levels of technical/security
knowledge.

·      Able to work independently and as a member of a high performing
team.

·      Ability to manage projects using appropriate tools and communication
methods.

·      Ability to manage multiple tasks (many are complex) simultaneously
and to bring activities to closure.

·      Ability to analyze and develop security and technology control
solutions from an end-to-end perspective (across platforms, application,
data and networks).

·      Expert knowledge of federated identity systems, directory services,
role-based access control, multi-factor authentication, and SSO.

·      Knowledge of standards (e.g. SAML, OAUTH, NTLM, LDAP, Kerberos, PKI,
etc.).

·      Strong worker knowledge of Microsoft Active Directory and FIM.

*Desired Skills*

·      5+ years of relevant work experience in IDM/IAM/IGA areas.

·      One or more industry recognized technical or security certifications
(CISSP, CISM, CISA, etc.).

·      Working experience with NIST information security controls and FIPS
standards.

·      Working experience with NetIQ

*Position Description*

This position is a lead role within a project team charted to review
current Identity and Access Management practices within a large and complex
state government environment, gather business requirements for preferred
provisioning and de-provisioning capabilities, perform a gap analysis of
capabilities, assist in documenting planned deliverables to meet the
identified business requirements, document recommendations for tools to
meet the identified business objectives, document the proposed Identity and
Access Management architecture as it relates to tools and integration into
the states environment.

As an Identity & Access Management Architect, you will be a member of the
Information Security team reporting to the agencies Chief Privacy Officer.
This role is an advanced level architect in the Information Security
Architecture team. This position requires that you work with minimal
supervision as a liaison between technical staff and business unit subject
matter experts to develop vision, roadmap, architecture and business cases
for ongoing projects under the Information Security Architecture pillar of
the Office of Information Services. As such this position would be
responsible for proposing and documenting a security architecture to meet
the vision and business requirements of the organization.

Additional responsibilities include: - Influence security posture by
evaluating business strategies and requirements; researching information
security standards and advising business & technology partners. - Partner
with Enterprise Architecture working groups to develop and approve
reference architectures and strategies. - Conduct industry and market
research and maintain a working knowledge of technologies and emerging
trends in the Identity Management discipline. - Oversee development and
life-cycle management of the services related to Identity Governance &
Administration services (e.g. demand management, roadmap development,
technical design, architecture, SLA definition and control, oversight for
roll-out to end user, optimization, and innovation). - Future state
planning.

-- 
You received this message because you are subscribed to the Google Groups "SAP 
Workflow" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/sap-workflow.
For more options, visit https://groups.google.com/d/optout.

Reply via email to