IAM Engineer -CyberArk in Dallas, TX at Pyramid Consulting, Inc

Date Posted: 6/25/2020

Job Snapshot

  • Employee Type:
    Full-Time
  • Location:
    Dallas, TX
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
    6/25/2020

Job Description

Immediate need for a talented IAM Engineer with one of our direct client. This is a 12+ month’s contract opportunity with long-term potential and is located in DALLAS, TX. Please review the job description below.
 
Job ID: 20-21225
 
Job Description: The Systems Security Engineer for IAM provides advanced technical skill and expertise in Identity Management solutions as well as a tactical experience involved with the execution of Identity Management solutions including identity management, access management privileged access management, and single-sign-on tools. The Systems Security Engineer for IAM is responsible for all aspects of supporting Identity Management solutions. This position has technical knowledge and experience in operational maintenance, availability, capacity planning, and monitoring of the identity management environment.
 
Required Skills
  • 5+ years’ experience working as a Systems Analyst, Technical Consultant, or equivalent position
  • Experience with Identity & Access Management concepts, such as user lifecycle management (provisioning and de-provisioning), Identity Governance, Role/Attribute Based Access Control, and least-privileged access.
  • Experience with Agile Practices like Scrum, Kanban, CI, CD preferred
  • Experience with build/tooling such as Git, Stash, Jenkins, Jira, and Confluence preferred
  • Demonstrated experience working according to software development methodologies
  • Ability to work with a highly collaborative, dynamic, and cross-functional team of senior engineers
  • Demonstrated experience implementing DevOps tools, capabilities, and methods
  • Ability to complete root-cause analysis on complex issues
  • Troubleshooting highly complex issues
  • Strong Knowledge of Risk and Compliance initiatives including PCI, SOX, HIPAA
  • Knowledge of the NIST Cyber Security Framework
 
Preferred Skills
  • 3+ Years of Java Development experience in an enterprise environment
  • 3+ Years of experience with Bash, Python, or Perl scripting
  • 3+ Years of experience with Identity Management tools such as NetIQ Identity Manager, SailPoint IIQ, Oracle Identity Manager, CA Identity Manager, and IDM Security Identity Manager
  • 3+ Years of experience with Privileged Account Management (PAM) tools such as CyberArk, BeyondTrust, and Centrify
  • Experience with REST/SOAP API’s
  • Has web development experience (HTML, JSP, CSS, JavaScript, and/or PHP)
Technical Expertise:
  • Effectively applies knowledge and skills of analysis, business processes, tools, domains, project methodologies, requirements definitions, and testing to solve a range of problems while supporting the Identity & Access Management area of the Cybersecurity team, both from an operations as well as an engineering perspective.
  • Partners with other Technology Team members to provide advice or solutions within his or her area of expertise.
  • Stays informed about current developments within his or her expertise.
  • Analytical Expertise:
  • Identifies problems, performs root cause analysis, investigates information, performs impact analysis, and formulates and executes plans to develop solutions.
  • Identifies strengths and weaknesses of alternative solutions, conclusions, or approaches to problems.
  • Understands and can estimate effort and value for solutions
  • Understands at a broad level how technology platforms/architectures are applied to automated business solutions.
Business Knowledge:
  • Actively engaged in industry, domain, process or technology trends, especially as it pertains to Identity & Access Management and Cybersecurity.
  • Task Management:
  • Acts as a coordination and facilitation point for organizing work efforts.
  • Sets up or follows established procedures to ensure high quality of work.
  • Understands dependency identification processes in technology work, verifies information and carefully reviews and checks the accuracy of own work.
  • Establishes or follows prioritization processes to drive work, and has a sense of urgency about getting work completed.
  • Looks for and seizes opportunities to do more or to do things better.
Our client is a leading Airline and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration. 

#Dal3 #Dal1 J2W:CB3