Career Center

Menu


Main Page
List All Jobs

Job Details


Title:IAM Security Specialist
Location:Columbus, GA
Openings:2
Type:Hire

Position: IAM Security Specialist
Client: TSYS
Location: Columbus, GA
Duration: Perm
Salary: $69,003–$114,405 / yr

Summary of This Role
Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, HPNSK/Tandem, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures. experience should be in administration, configuration and troubleshooting: Privilege Access Management, ADFS, Unix, Linux, Windows Server, Single Sign-on, Step-up authentication, IBM IAM Product Suite.
What Part Will You Play?

• Experience setting up, installing and maintaining software on Windows and Unix (Linux, AIX) platforms
• Knowledge of enterprise directories (LDAP, Active Directory, etc.)
• Knowledge of Java, .NET, or similar object-oriented programming language
• Knowledge of relational databases (Oracle, MSSQL, MySQL, etc.)
• Knowledge of Federation (ADFS, SAML, etc.)
• Knowledge of IBM systems (IBM IAM Product Suite)
• Experience with troubleshooting complex systems spanning multiple environments
• Experience with the following web technologies (XML, SPML/SOAP, Web Services, etc.)
• Experience with web application servers (Tomcat, WebSphere, WebLogic, JBOSS, etc.)
• Familiarity with Role Based Access Control (RBAC) a plus
• Ability to multitask
• Proficient in writing technical documentation
Provides expertise and advice while troubleshooting and repairing failed permissions and access levels for Identity and Access Management (IAM) tools, applications and assigned technologies. This ensures appropriate access and meets internal/external data security requirements.
Reviews maintenance reports and violation logs to detect and employ solutions that deter existing and future unauthorized access that may be a threat to corporate, client, and team member security.
Analyzes, designs and deploys IAM architecture and other security projects with an advanced understanding of IAM, operational, and security technologies to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.
Creates, maintains, and reviews new relevant documentation to include, but not limited to, Standard Operating Procedures, project change control methodologies, and architectural diagrams. Provides adequate support and processes for maintaining the confidentiality, integrity and availability of critical security systems.
Administer, configure, implement, troubleshoot complex IAM solutions and expand automation through use of Privilege Access Management Solutions, Windows/Unix server, Single sign-on solutions, Step-up authentication solutions, ADFS, and IBM IAM Product Suite.
What Are We Looking For in This Role?
Minimum Qualifications
Bachelor's Degree
Relevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experience
Typically Minimum 4 Years Relevant Exp
Responsible for the implementation, security, maintenance and access administration of information security managed technologies
Must have the ability to pass and maintain a government level security clearance

Preferred Qualifications
Bachelor's Degree
Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
Typically Minimum 4 Years Relevant Exp
Experience supporting UNIX, Windows Server, mainframe and/or HP NonStop systems. Experience with remote administration tools, basic networking concepts, Help Desk support, scripting/programming and/or logical access administration using security products (ACF2, Active Directory, LDAP, etc.).
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred
What Are Our Desired Skills and Capabilities?
Skills / Knowledge - Having wide-ranging experience, uses professional concepts and company objectives to resolve complex issues in creative and effective ways. Some barriers to entry exist at this level (e.g., dept./peer review).
Job Complexity - Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results. Networks with key contacts outside own area of expertise.
Supervision - Determines methods and procedures on new assignments and may coordinate activities of other personnel (Team Lead).
Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problems
Applications and Systems - Utilizes, configures and monitors security using Identity and Access Management technologies to meet internal and external requirements for data security
Project Management - Plans, organizes, motivates and controls resources to achieve defined goals



Apply to Job




Powered by: CATS - Applicant Tracking System