Brakebush Brothers, Inc.
Identity and Access Management Engineer
Brakebush Brothers, Inc., Madison, Wisconsin, United States,
Supervisor:
IT Security ManagerJOB DESCRIPTIONSummary:
The Identity and Access Management (IAM) Engineer is responsible for the design, planning, development, implementation, maintenance, documentation, and support of all IAM focused tools, services, applications, and methodologies.Schedule & Location:
This is a hybrid role with flexible schedule, requiring the candidate to work 3 days at the corporate office located in Westfield, WI.
Essential Functions:Works in partnership with Cyber Security Manager, Identity and Access Management to define the identity direction for the organization, including automated provisioning, role-based access, privileged account management, identity governance, and single sign on efforts.Collaborates on development and interpretation of IAM policies and procedures.Assists management with complex projects and assumes ongoing support of identity system infrastructure.Lead the design, implementation, and maintenance of Identity and Access Management (IAM) solutions.Develop and maintain identity governance processes, including user provisioning, de-provisioning, and role-based access control (RBAC).Configure and manage authentication and authorization mechanisms, such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and privilege escalation.Ensure IAM systems and policies are following industry standards, regulations, and best practices, and assist in audits and assessments.Respond to IAM-related security incidents, investigating and resolving security breaches and access issues, and improving IAM security post-incident.Create and maintain detailed documentation for IAM processes, policies, and configurations.Stay current with IAM technology trends and drive continuous improvement in IAM systems and processes.
Required Qualifications:A bachelor's degree in a relevant field (e.g., IT, Computer Science), or equivalent work experience.Two years related experience and/or training is required. Documented experience and a solid understanding of identity lifecycle management, credential management, identity federation, role-based access, and identity governance is required.Five or more years' experience in Information Technology.Experience in integrating IAM and/or security products in an enterprise environment.Experience across a variety of technologies such as databases, directory services, application servers, network infrastructures, and an understanding of fundamental security and data flows within these components.Fundamental understanding of IT Service Management operations.Experience with identity products including Identity and Access Governance, Access Management, and Privileged Access Management solutions.Experience with requirements, design, implementation, integration, and testing for IAM component integration into on premise.Ability to maintain professional and strong relationships with business partners, contractors, and stakeholders.Proficiency in using IAM tools and technologies, such as Identity and Access Management systems.Solid understanding of cybersecurity concepts, security standards.Proficiency in scripting and automation PowerShell, Python, JSON for IAM-related tasks.Excellent communication skills to collaborate with various teams and explain IAM concepts to non-technical stakeholders.Strong problem-solving and analytical skills for assessing and resolving IAM-related challenges.
Preferred Qualifications:Passion for cybersecurity.Ability to work independently and function effectively as part of a team.Ability to write scripts/code using Python, Perl, PowerShell, or an equivalent language.Passion for learning about new information security related technologies, topics.Familiar with operation of both Windows and Linux based systems.Advance knowledge and skills by attending training and conferences and sharing with other team members.
Supervisory Responsibility:
None.
Work Environment:
Office environment. Subject to extended periods of sitting, working on PC and talking on telephone.
Physical Demands:
This position would be primarily sitting with little to no lifting or other physical demands.
Position Type:
1st Shift, Exempt.
Travel:
Little to none except possibly for training.
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
#J-18808-Ljbffr
IT Security ManagerJOB DESCRIPTIONSummary:
The Identity and Access Management (IAM) Engineer is responsible for the design, planning, development, implementation, maintenance, documentation, and support of all IAM focused tools, services, applications, and methodologies.Schedule & Location:
This is a hybrid role with flexible schedule, requiring the candidate to work 3 days at the corporate office located in Westfield, WI.
Essential Functions:Works in partnership with Cyber Security Manager, Identity and Access Management to define the identity direction for the organization, including automated provisioning, role-based access, privileged account management, identity governance, and single sign on efforts.Collaborates on development and interpretation of IAM policies and procedures.Assists management with complex projects and assumes ongoing support of identity system infrastructure.Lead the design, implementation, and maintenance of Identity and Access Management (IAM) solutions.Develop and maintain identity governance processes, including user provisioning, de-provisioning, and role-based access control (RBAC).Configure and manage authentication and authorization mechanisms, such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and privilege escalation.Ensure IAM systems and policies are following industry standards, regulations, and best practices, and assist in audits and assessments.Respond to IAM-related security incidents, investigating and resolving security breaches and access issues, and improving IAM security post-incident.Create and maintain detailed documentation for IAM processes, policies, and configurations.Stay current with IAM technology trends and drive continuous improvement in IAM systems and processes.
Required Qualifications:A bachelor's degree in a relevant field (e.g., IT, Computer Science), or equivalent work experience.Two years related experience and/or training is required. Documented experience and a solid understanding of identity lifecycle management, credential management, identity federation, role-based access, and identity governance is required.Five or more years' experience in Information Technology.Experience in integrating IAM and/or security products in an enterprise environment.Experience across a variety of technologies such as databases, directory services, application servers, network infrastructures, and an understanding of fundamental security and data flows within these components.Fundamental understanding of IT Service Management operations.Experience with identity products including Identity and Access Governance, Access Management, and Privileged Access Management solutions.Experience with requirements, design, implementation, integration, and testing for IAM component integration into on premise.Ability to maintain professional and strong relationships with business partners, contractors, and stakeholders.Proficiency in using IAM tools and technologies, such as Identity and Access Management systems.Solid understanding of cybersecurity concepts, security standards.Proficiency in scripting and automation PowerShell, Python, JSON for IAM-related tasks.Excellent communication skills to collaborate with various teams and explain IAM concepts to non-technical stakeholders.Strong problem-solving and analytical skills for assessing and resolving IAM-related challenges.
Preferred Qualifications:Passion for cybersecurity.Ability to work independently and function effectively as part of a team.Ability to write scripts/code using Python, Perl, PowerShell, or an equivalent language.Passion for learning about new information security related technologies, topics.Familiar with operation of both Windows and Linux based systems.Advance knowledge and skills by attending training and conferences and sharing with other team members.
Supervisory Responsibility:
None.
Work Environment:
Office environment. Subject to extended periods of sitting, working on PC and talking on telephone.
Physical Demands:
This position would be primarily sitting with little to no lifting or other physical demands.
Position Type:
1st Shift, Exempt.
Travel:
Little to none except possibly for training.
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.
#J-18808-Ljbffr