Templar Shield
IAM Lead (SailPoint, ForgeRock, CyberArk)
Templar Shield, Miami, Florida, us, 33222
Miami, United States
| Posted on 07/09/2024Job Responsibilities
At least 8 to 10 years of experience in the following areas:Identity & Access Management with Implementation, development, and production support (ForgeRock OpenAM).IAM and SailPoint IIQ / IDN architecture, design, development, configuration, testing, integration, and deployment.CyberArk technical delivery and advisory work, designing and delivering capabilities to fulfill business requirements.Experience in onboarding application accounts in CyberArk AAM and work with application owners to change applications to get passwords from the vault.Hands-on experience on Access management tool integration with MFA tools i.e. Okta, Google Authenticator, RSA Secure ID etc.Experience in application onboarding, provisioning, workflow customization, access review etc.SailPoint connector development experience with both out-of-the-box and custom connectors.Implementation of CyberArk Privileged Account Security Suite.Candidate should have excellent coding & analytical skills. Candidate should be good at oral and written communication skills.Minimum of 7+ years of experience in IAM with Implementation, development, and production support in ForgeRock, SailPoint IIQ / IDN.Hands-on experience in IAM architecture, design, development, configuration, testing, integration, and deployment.Experience with ForgeRock OpenAM is required.Hands-on experience in web services, XML, REST APIs, and JMS.Hands-on experience with API integration with API Gateway.Hands-on experience on deployment of Access Management tools.Hands-on experience on Access management tool integration with MFA tools i.e. Okta, Google Authenticator, RSA Secure ID etc.Hands-on custom connector development experience - Contribute towards the definition of product and technical roadmaps.Experience in Consumer Identity & Access Management preferably with ForgeRock.Hands-on with Social ID integration with CIAM Tools i.e. LinkedIn, Facebook, Google.Create and support security policies, standards, and processes based on customer business goals. Create and maintain comprehensive documentation.Experience in developing applications using Java, J2EE components including Servlets, JSP, JDBC.Should be experienced in understanding client’s business environment and should be able to propose fit for purpose IAM solution.Should have experience in implementing at least one complete IAM SDLC engagements projects. This must include activities such as requirements gathering, analysis, design, development, testing, deployment, and application support.Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL.Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties, and recertification.Should have worked on both out-of-the-box adapters/interfaces and custom adapters/interfaces for IAM enterprise solutions.Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL.Should have experience in carrying out application integration with the IAM solution.Understanding of network concepts such as DNS, TCP/IP, Firewall, Load balancers, GTM, LTM, Radius Server, Proxy, Reverse Proxy etc.CyberArk Responsibilities
Minimum of 7+ years of experience in CyberArk technical delivery and advisory work, designing and delivering capabilities to fulfill business requirements.Experience in Installation/deployment implementation of CyberArk PAM infrastructure components (EPV, PVWA, CPM, PSM, AIM, AAM) for large scale customers.Implementation of CyberArk Privileged Account Security Suite.Should have good knowledge of CyberArk Disaster Recovery and DNA.Managing Safe and provisioning access as per client requirement.Strong knowledge on integrating various platforms with CyberArk such as AD, SIEM etc.Understanding of architecture components and implementation of varied CyberArk components.Detailed understanding of varied components in CyberArk as below:CyberArk Digital VaultCyberArk Application Access Manager (AAM)Creating and Managing SafesPrivileged Session Manager (PSM)PSM for Web and SSHOn-Demand Privileges Manager (OPM)Password Vault Web Access (PVWA)PSM SSH Proxy and Backup/RestoreCyberArk Command Line Interface (PACLI)Knowledge on CPM and PSM connector customizationWorked on building teams from scratch for implementation and operations and understanding of resourcing, planning etc.Knowledge of latest upgrades and their impact on existing versionRecommending solutions for repetitive issues within and outside the realm of PAMAbility to navigate ambiguous situations and work with multiple teams for quick remediation on critical issues.Responsible for testing and upgrades of the CyberArk platform in the lower and production environment.Perform CyberArk upgrades as per organization and vendor release roadmap.Troubleshoot issues with integrating various platforms with CyberArk such as different LDAP providers, Windows, and Unix servers.
#J-18808-Ljbffr
| Posted on 07/09/2024Job Responsibilities
At least 8 to 10 years of experience in the following areas:Identity & Access Management with Implementation, development, and production support (ForgeRock OpenAM).IAM and SailPoint IIQ / IDN architecture, design, development, configuration, testing, integration, and deployment.CyberArk technical delivery and advisory work, designing and delivering capabilities to fulfill business requirements.Experience in onboarding application accounts in CyberArk AAM and work with application owners to change applications to get passwords from the vault.Hands-on experience on Access management tool integration with MFA tools i.e. Okta, Google Authenticator, RSA Secure ID etc.Experience in application onboarding, provisioning, workflow customization, access review etc.SailPoint connector development experience with both out-of-the-box and custom connectors.Implementation of CyberArk Privileged Account Security Suite.Candidate should have excellent coding & analytical skills. Candidate should be good at oral and written communication skills.Minimum of 7+ years of experience in IAM with Implementation, development, and production support in ForgeRock, SailPoint IIQ / IDN.Hands-on experience in IAM architecture, design, development, configuration, testing, integration, and deployment.Experience with ForgeRock OpenAM is required.Hands-on experience in web services, XML, REST APIs, and JMS.Hands-on experience with API integration with API Gateway.Hands-on experience on deployment of Access Management tools.Hands-on experience on Access management tool integration with MFA tools i.e. Okta, Google Authenticator, RSA Secure ID etc.Hands-on custom connector development experience - Contribute towards the definition of product and technical roadmaps.Experience in Consumer Identity & Access Management preferably with ForgeRock.Hands-on with Social ID integration with CIAM Tools i.e. LinkedIn, Facebook, Google.Create and support security policies, standards, and processes based on customer business goals. Create and maintain comprehensive documentation.Experience in developing applications using Java, J2EE components including Servlets, JSP, JDBC.Should be experienced in understanding client’s business environment and should be able to propose fit for purpose IAM solution.Should have experience in implementing at least one complete IAM SDLC engagements projects. This must include activities such as requirements gathering, analysis, design, development, testing, deployment, and application support.Should have exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL.Should have good understanding in concepts such as self-service, automated approval process, RBAC, attestation, separation of duties, and recertification.Should have worked on both out-of-the-box adapters/interfaces and custom adapters/interfaces for IAM enterprise solutions.Having experience/knowledge in following technologies would be an advantage: LDAP, PKI, SSL.Should have experience in carrying out application integration with the IAM solution.Understanding of network concepts such as DNS, TCP/IP, Firewall, Load balancers, GTM, LTM, Radius Server, Proxy, Reverse Proxy etc.CyberArk Responsibilities
Minimum of 7+ years of experience in CyberArk technical delivery and advisory work, designing and delivering capabilities to fulfill business requirements.Experience in Installation/deployment implementation of CyberArk PAM infrastructure components (EPV, PVWA, CPM, PSM, AIM, AAM) for large scale customers.Implementation of CyberArk Privileged Account Security Suite.Should have good knowledge of CyberArk Disaster Recovery and DNA.Managing Safe and provisioning access as per client requirement.Strong knowledge on integrating various platforms with CyberArk such as AD, SIEM etc.Understanding of architecture components and implementation of varied CyberArk components.Detailed understanding of varied components in CyberArk as below:CyberArk Digital VaultCyberArk Application Access Manager (AAM)Creating and Managing SafesPrivileged Session Manager (PSM)PSM for Web and SSHOn-Demand Privileges Manager (OPM)Password Vault Web Access (PVWA)PSM SSH Proxy and Backup/RestoreCyberArk Command Line Interface (PACLI)Knowledge on CPM and PSM connector customizationWorked on building teams from scratch for implementation and operations and understanding of resourcing, planning etc.Knowledge of latest upgrades and their impact on existing versionRecommending solutions for repetitive issues within and outside the realm of PAMAbility to navigate ambiguous situations and work with multiple teams for quick remediation on critical issues.Responsible for testing and upgrades of the CyberArk platform in the lower and production environment.Perform CyberArk upgrades as per organization and vendor release roadmap.Troubleshoot issues with integrating various platforms with CyberArk such as different LDAP providers, Windows, and Unix servers.
#J-18808-Ljbffr