Navtech, Inc.
Identity Access Management (IAM) Administrator
Navtech, Inc., Washington, District Of Columbia, United States, 20003
Hi Folks,
I have an opportunity for "Identity Access Management (IAM) Administrator, Washington, DC, Hybrid 3 Days Onsite" and I am looking for a candidate who can join Immediately if you are interested, reply to me with your updated resume or if you could refer someone I would really appreciate it.
Job Title : Identity Access Management (IAM) AdministratorJob Location : Washington, DC-Hybrid 3 days OnsiteDuration : 6 to 12 Months ContractAt the time of submission, H1/EAD applicants must provide their passport number.
ESSENTIAL DUTIES
The position's essential duties include the following:
Work with the Identity Access Management team to continue making enhancement to the Identity Access Management program.Manage user profiles, including access to groups, password reset, and multi factor reset.Manage and maintain standardized organization units, custom attributes, and security groups in Active Directory.General support, administration, and maintenance of systems.Work closely with development teams to perform User management, group management and Password management requests.Create and maintain Identify Access Management metrics.Troubleshoot identity and access management issues, and document resolutions within appropriate systems.Document various system access for all Users to store in a centralized repository (CMBD).Support efforts regarding audit findings, adherence to compliance and organizational change.Responsible for working incidents and service requests escalated by the Service Desk within the service level agreement.
TYPE OF EXPERIENCE
Bachelor's degree and/or relevant technical training and certificationsThree (3) to Four (4) years of directly related experienceTwo (2) to Three (3) years of experience performing server administration, either Windows and/or Linux/UnixThree (3) years of experience on cloud identity and access management systemsTwo (2) to Three (3) years of experience of working in a FISMA, SOX, or HIPPA environment.Fundamental knowledge on scripting tools such as python, java, PowerShellKnowledge of design and operations of Access Management, LDAP, Active Directory, user management, and password managementExperience working with Active Directory and LDAPKnowledge of authentication, authorization, provisioning, deprovisioning, OTP and multi-factor authentication, password policies, role-based authentication, single sign
EDUCATION
A bachelor's degree in computer science and/or Information Technology; relevant work experience (over eight years) may be acceptable.
LENGTH OF EXPERIENCE
The minimum amount of total "on-the-job" experience required is twelve (8) years, for the position.This means experience in a related area or time spent performing similar work that provides the background for the current position.
Thanks for your valuable time!!!
Best Regards,
Kevin Smith
Email:- kevin@navtechusa.com
I have an opportunity for "Identity Access Management (IAM) Administrator, Washington, DC, Hybrid 3 Days Onsite" and I am looking for a candidate who can join Immediately if you are interested, reply to me with your updated resume or if you could refer someone I would really appreciate it.
Job Title : Identity Access Management (IAM) AdministratorJob Location : Washington, DC-Hybrid 3 days OnsiteDuration : 6 to 12 Months ContractAt the time of submission, H1/EAD applicants must provide their passport number.
ESSENTIAL DUTIES
The position's essential duties include the following:
Work with the Identity Access Management team to continue making enhancement to the Identity Access Management program.Manage user profiles, including access to groups, password reset, and multi factor reset.Manage and maintain standardized organization units, custom attributes, and security groups in Active Directory.General support, administration, and maintenance of systems.Work closely with development teams to perform User management, group management and Password management requests.Create and maintain Identify Access Management metrics.Troubleshoot identity and access management issues, and document resolutions within appropriate systems.Document various system access for all Users to store in a centralized repository (CMBD).Support efforts regarding audit findings, adherence to compliance and organizational change.Responsible for working incidents and service requests escalated by the Service Desk within the service level agreement.
TYPE OF EXPERIENCE
Bachelor's degree and/or relevant technical training and certificationsThree (3) to Four (4) years of directly related experienceTwo (2) to Three (3) years of experience performing server administration, either Windows and/or Linux/UnixThree (3) years of experience on cloud identity and access management systemsTwo (2) to Three (3) years of experience of working in a FISMA, SOX, or HIPPA environment.Fundamental knowledge on scripting tools such as python, java, PowerShellKnowledge of design and operations of Access Management, LDAP, Active Directory, user management, and password managementExperience working with Active Directory and LDAPKnowledge of authentication, authorization, provisioning, deprovisioning, OTP and multi-factor authentication, password policies, role-based authentication, single sign
EDUCATION
A bachelor's degree in computer science and/or Information Technology; relevant work experience (over eight years) may be acceptable.
LENGTH OF EXPERIENCE
The minimum amount of total "on-the-job" experience required is twelve (8) years, for the position.This means experience in a related area or time spent performing similar work that provides the background for the current position.
Thanks for your valuable time!!!
Best Regards,
Kevin Smith
Email:- kevin@navtechusa.com