Risk_Cyber security_IAM Functional_Staff 2_BLR/GGN
Gurgaon (Gurgaon) Infra / Networks / Telecom
Job description
Security Analyst – IAM
Job Description:
· Bachelor or Master Degree in Computer Engineering / Science
· Very good understanding of information security concepts with in-depth knowledge of IAM solutions and latest trends.
· Experience in understanding client’s business environment and proposing fit for purpose IAM solution.
· Experience of one or more enterprise-grade Identity Management solutions from vendors in the marketplace such as Oracle Identity Manager, Novell Identity Manager, IBM Tivoli Identity Manager, Sun ONE, CA site minder, Sail point,Saviynt,CyberArk, Centrify etc.
· Should have experience in implementing at least one complete IAM SDLC engagements projects, including requirements gathering, analysis, design, development, testing, deployment, and application support.
· Should have experience in delivering IT projects, including requirements analysis, defining architecture, and conducting detailed technical design, development, and lead solution delivery
· Exposure to a variety of programming languages and technologies, including, but not limited to, J2EE (JSP, Servlets, EJB, XML, Java), .Net, Oracle, DB2, and MS/SQL
· Good understanding of the concepts such as self-service, automated approval process, RBAC, attestation, separation of duties and recertification
· Experience working on both out-of-the-box adapters/interfaces and custom adapters /interfaces for IAM enterprise solutions.
· Experience / Knowledge in following technologies would be an advantage: LDAP, PKI, SSL,
· Should have experience in carrying out application integration with the IAM solution
· Should have had direct client experience, including working with client teams in an on-site and offshore mode
· Knowledge of Linux, and Windows operating system
· High level networking knowledge is preferred
· Desirable to have certifications in security domain, such as CISSP and CISA or any IAM product specific certifications
Tool set required:
· Oracle identity management family
· IBM Tivoli identity management family
· Sail Point
· CA SSO,IDM
· RSA Aveksa
· Saviynt
· CyberArk