Careers

ISAM Access Management Operations Engineer

  • Request Technology
  • 5019 Nations Crossing Rd, Charlotte, NC 28217, USA
  • Nov 09, 2020
[Information Technology]

Job Description

Overview

***We are unable to sponsor for this permanent full-time role***

Prestigious Enterprise Company is currently seeking an Access Management Operations Engineer with ISAM experience. Candidate designs, develops, and deploys portions of cloud and local systems, applications, and technical solutions to provide and maintain cyber security for the organization technology architecture and products.

Responsibilities:

Provide application support during respective shift in the Follow the Sun model
Participate in Enterprise Command Center resolution and Incident related calls with client application areas
Deep dive troubleshoot issues within defined SLAs for the ISAM Infrastructure
Change and Release Management Responsibilities: Manage Changes required for the execution of Infrastructure Tasks via the AChange Management process (representation at all review meetings; obtain approvals)
Create new or optimize existing scripts for generation and distribution of Consumption and Capacity reports (CPU, memory, availability, etc)
Manage documentation related to Infrastructure processes and procedures
Responsible for Performance testing and documentation of test results
Responsible for execution of Operational and day to day efforts/tasks via scripts and documented procedures for the Infrastructure, including patching, updates, on-boarding and fixes for the environment
Qualifications:

Bachelor s Degree: Computer Science or equivalent
3 Years Identity and Access Management Support Experience
Working knowledge of any Access Management product (Preferably ISAM and Auth0 or like product)
Working knowledge of any Federations product (Specifically SAML 2.0)
Knowledge of Web based applications including:
Browsers, headers and http/https protocols
Cookies and cookie handling
SSL and certificates
OAuth, SAML, xml and attribute handling
ITIL knowledge (Incident Management, Problem Management, Change Management and Release Management)
Working knowledge of Networking (DNS, Load Balancers, Firewalls)
Working knowledge of Unix and RHEL 6/7 LINUX platforms including:
Hardware performance and capacity commands
Text editors (commands, etc)
Log Reviews ability to identify errors/issues and troubleshoot
Understanding of PowerShell and UNIX Shell scripting

Tagged as: access, access management, beanshell, beyondtrust, ca identity manager, cyberark, IAM, IBM, identity and access management, IDM, isam, linux, oracle identity manager, ping, ping identity, powershell, radiant logic, sailpoint, scripting, security, siteminder, TAM, unix


Associated topics: attack, identity, iam, information assurance, leak, security, security analyst, security engineer, threat, violation