Logo
Navtech, Inc.

Identity Access Management (IAM) Administrator

Navtech, Inc., Washington, District Of Columbia, United States, 20003


Hi Folks,

I have an opportunity for "Identity Access Management (IAM) Administrator, Washington, DC, Hybrid 3 Days Onsite" and I am looking for a candidate who can join Immediately if you are interested, reply to me with your updated resume or if you could refer someone I would really appreciate it.

Job Title : Identity Access Management (IAM) AdministratorJob Location : Washington, DC-Hybrid 3 days OnsiteDuration : 6 to 12 Months ContractAt the time of submission, H1/EAD applicants must provide their passport number.

ESSENTIAL DUTIES

The position's essential duties include the following:

Work with the Identity Access Management team to continue making enhancement to the Identity Access Management program.Manage user profiles, including access to groups, password reset, and multi factor reset.Manage and maintain standardized organization units, custom attributes, and security groups in Active Directory.General support, administration, and maintenance of systems.Work closely with development teams to perform User management, group management and Password management requests.Create and maintain Identify Access Management metrics.Troubleshoot identity and access management issues, and document resolutions within appropriate systems.Document various system access for all Users to store in a centralized repository (CMBD).Support efforts regarding audit findings, adherence to compliance and organizational change.Responsible for working incidents and service requests escalated by the Service Desk within the service level agreement.

TYPE OF EXPERIENCE

Bachelor's degree and/or relevant technical training and certificationsThree (3) to Four (4) years of directly related experienceTwo (2) to Three (3) years of experience performing server administration, either Windows and/or Linux/UnixThree (3) years of experience on cloud identity and access management systemsTwo (2) to Three (3) years of experience of working in a FISMA, SOX, or HIPPA environment.Fundamental knowledge on scripting tools such as python, java, PowerShellKnowledge of design and operations of Access Management, LDAP, Active Directory, user management, and password managementExperience working with Active Directory and LDAPKnowledge of authentication, authorization, provisioning, deprovisioning, OTP and multi-factor authentication, password policies, role-based authentication, single sign

EDUCATION

A bachelor's degree in computer science and/or Information Technology; relevant work experience (over eight years) may be acceptable.

LENGTH OF EXPERIENCE

The minimum amount of total "on-the-job" experience required is twelve (8) years, for the position.This means experience in a related area or time spent performing similar work that provides the background for the current position.

Thanks for your valuable time!!!

Best Regards,

Kevin Smith

Email:- kevin@navtechusa.com