Sr IT Engineer Infrastructure – IAM

Urgent

Apply for this job

Email *
Full Name *
CV Attachment *
Browse

Upload file .pdf, .doc, .docx

Job Description

In addition to the responsibilities listed below, this position is responsible for designing, building, testing, and implementing information security technologies, including infrastructure and supporting applications related to data protection, network security, end-point security, and threat monitoring, and/or IAM. This includes managing IS projects through both pre-production and implementation phases by collaborating with internal technology risk teams, infrastructure management, and external business groups to understand requirements and design and implement solutions accordingly; testing and validating upgrades, enhancements, or new technologies prior to production implementation; providing incident support to help resolve and remediate application production issues; and implementing new security controls as appropriate to resolve incidences and mitigate threat risks.

This position is also responsible for maintaining a broad understanding of infrastructure security operations, collaborating with the IS Architecture & Strategy team to help develop and validate the long-term direction for security technologies, and providing technical subject matter expertise to support the ongoing assessment and mitigation of information security risks.                                                                          

Essential Responsibilities

  • Completes work assignments and supports business-specific projects by applying expertise in subject area; supportingthe development of work plans to meet business priorities and deadlines; ensuring team follows all procedures andpolicies; coordinating and assigning resources to accomplish priorities and deadlines; collaborating cross-functionally tomake effective business decisions; solving complex problems; escalating high priority issues or risks, as appropriate;and recognizing and capitalizing on improvement opportunities.
  • Practices self-development and promotes learning in others by proactively providing information, resources, advice, andexpertise with coworkers and customers; building relationships with cross-functional stakeholders; influencing othersthrough technical explanations and examples; adapting to competing demands and new responsibilities; listening andresponding to, seeking, and addressing performance feedback; providing feedback to others and managers; creating and executing plans to capitalize on strengths and develop weaknesses; supporting team collaboration; and adapting toand learning from change, difficulties, and feedback.
  • As part of the IT Engineering job family, this position is responsible for leveraging DEVOPS, and both Waterfall andAgile practices, to design, develop, and deliver resilient, secure, multi-channel, high-volume, high-transaction, on/offpremise, cloud-based solutions.
  • Supports the review of team deliverables.
  • Provides some recommendations and input on options, risks, costs, and benefits for systems designs.
  • Collaborates with team members to develop project support plans, schedules, and assignments.
  • Translates business and functional requirements into technical specifications that support integrated and sustainabledesigns for designated infrastructure systems by partnering with Business Analysts to understand business needs andfunctional specifications.
  • Serves as a liaison with business partners, Solutions, and enterprise architects to define and understand targetstrategies.
  • Collaborates with counterparts in various IT Teams (e.g., database, operations, technical support) throughout systemdevelopment and implementation.
  • Develops and modifies solutions by identifying technical solutions to business problems.
  • Provides consultation and technical advice on IT infrastructure planning, engineering, and architecture for assigned systems by assessing the implications of IT strategies on infrastructure capabilities.
  • Reviews and makes changes to technical specifications and documentation.
  • Collaborates with IT teams and key business partners to troubleshoot complex systems and provides solutions, as appropriate.
  • Evaluates existing systems to make recommendations on resources required to maintain service levels.
  • Evaluates new service options, identifies issues and impacts, and provides recommendations on feasibility and ROI.
  • Collaborates with architects and software engineers to ensure functional specifications are converted into flexible, scalable, and maintainable designs.
  • Verifies system designs adhere to company architecture standards.
  • Drives physical architecture design for new initiatives.
  • Leads the implementation of assigned enterprise infrastructure systems to ensure successful deployment and operation by developing and documenting detailed standards (e.g., guidelines, processes, procedures) for the introduction and maintenance of services.

Minimum Qualifications

  • Minimum four (4) years experience in the planning, design, and implementation of IAM infrastructure or security solutions,including Minimum two (2) years in the configuration, implementation, and operation of infrastructure or securitytechnologies.
  • Minimum one (1) year in a technical leadership role with or without direct reports.
  • Bachelor’s degree in Computer Science, CIS, or related field and Minimum six (6) years experience in an IT operations environment with technical experience in distributed technologies , systems development, and/or networking. Additional equivalent work experience may be substituted for the degree requirement.
  • Ping Technologies (ping federate, ping access,  ping ID, ping risk intelligence, ping directory)                                                      

Additional Requirements

  • Good knowledge of software engineering practices: continuous integration, configuration management, build optimization, build automation, and deployment.
  • Extensive knowledge of Windows and UNIX/Linux environments.
  • Strong familiarity with software configuration management systems and/or source code version control systems.
  • Strong knowledge of most scripting languages such as Perl, Shell Script, Python…
  • Proven track record of deploying large, complex implementations.
  • Good written and verbal communication skills.
  • Information Security or internal IT audit experience a plus.
  • The ability to learn and apply new concepts quickly
  • Proven analytical and problem-solving ability
  • Good communication, ability to explain complex concepts
  • Good organization, and interpersonal skills
  • Ability to balance and prioritize work
  • Experience working in a team-oriented, collaborative environment.
  • Must be trustworthy in keeping sensitive data confidential

Preferred Qualifications

  • In lieu of a Bachelor’s degree, equivalent work experience of three (3) years may be substituted for a total of eight (8) years experience.
  • 3 years of hands on experience in two or more of the following IAM technologies:
  • Sailpoint for access governance
  • Cyberark for privilege access management
  • Ping Technologies (ping federate, ping access,  ping ID, ping risk intelligence, ping directory)
  • Venafi for certificate management,  MS PKI
  • 2 years working knowledge in Build and Deployment automation using Ansible, Selenium, Java, API’s, SQL would be an added advantage
  • 3 years experience with engineering tools such as bug tracking and source code control systems.
  • 3 years experience working in a large matrixed organization.
  • 3 years experience writing technical documentation in a software development environment.
  • 2 years experience developing and/or implementing mobile applications.
  • 2 years experience working with Git source code control.
  • 2 years development experience integrating with third-party systems.
  • 3 years experience working with web services (API Framework)
  • 2 years working knowledge of GITHUB, Maven, Jenkins and UCD or any other deployment tool.
  • Experience supporting security architectures and solutions consistent with information security policies, standards and strategy
  • Highly motivated, self-starting, and committed to achieving results and have a strong sense of ownership and follow through to resolution
  • Must possess organizational proficiencies to multi-task and work in a fast-paced environment under limited supervision
  • Must have strong problem-solving skills
  • Experience in: Identity and Access Management Applications.
  • Identity Lifecycle Management
  • Identity Data Models                                                                                                            

Benefits

  • Transportation.
  • Life insurance.
  • Medical insurance.
  • Solidarity association.
  • Growth plans.
  • Additional days off.

K4