- Truist (Charlotte, NC)
- …to configure Truist's Identity Governance and Administration (IGA) capability based on access control design and ensure adherence to service level agreements ... appropriate, and enforcing other applicable security controls per the IAM standard. Continually evaluates and matures access ...or equivalent + 5 years' experience with industry standard access control methods such as Access… more
- Truist (Charlotte, NC)
- … across all Truist assets that leverages industry best practices such as Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and ... Policy-Based Access Control (PBAC). Designs access controls to meet the business' access ...appropriate, and enforcing other applicable security controls per the IAM standard. Continually evaluates and matures access … more
- CGI Technologies and Solutions, Inc. (Fairfax, VA)
- …and training material to support development and deployment tasks. * Implement Role-based Access Control (RBAC) frameworks and least privileged access models ... support Identity as a Service (IDaaS) and Identity and Access Management (IDAM) services and is a consultant...\#S2C **Skills:** + Dev/Tools Infrastructure Supp + Identity and Access Mgt ( IAM ) + IT Strategy **What… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Solution Delivery Consultant , you...will: + Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards +… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Okta Senior Consultant , you...will: + Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards +… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Senior Consultant , you will:...Identity & Access Governance including Role based access control , access request and… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Saviynt Senior Consultant , you...& Access Governance experience including Role based access control , access request and… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte IAM Methods 2.0 methodology to help clients control which employees, customers, ... will do: As Identity and Access Management ( IAM ) solutions team Sr. Consultant , you will...controls which mitigate risks, and related opportunities for internal control improvement to address the growing challenges of cyber… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Ping Senior Consultant , you...Identity & Access Governance including Role based access control , access request and… more
- Deloitte (Columbus, OH)
- …Recruiting for this role ends on November 7, 2024. Work you'll do + Utilize IAM (Identity and Access Management) programs to enable federal clients to protect ... against digital identity risks. + Provide appropriate access to applications, systems, and data with advanced authentication. + Oversee the spread of information… more
- Deloitte (Columbus, OH)
- …serve Preferred + 4+ years of experience in ICAM Experience Role-based Access Control (RBAC) including role mining within SailPoint IIQ + ... 2+ years' experience with IGA operational tasks (eg, creating connectors, defining access control , managing applications credentials) + 2+ years' experience… more
- HCA Healthcare (Nashville, TN)
- …be responsible to investigate, develop, formulate, and implement strategies to secure and control access to critical systems and data, while ensuring compliance ... + Strong analytical and critical thinking skills, with the ability to analyze complex access control scenarios and develop appropriate solutions. + Stay up to… more
- Mohegan Sun (Uncasville, CT)
- …Trust Network Access ), Privileged Access Management (PAM), Identity Access Management ( IAM ), Extended Detection and Response (XDR), and Security ... Service Edge (SSE) (Data Loss Prevention, Cloud Access Security Broker, Secure Web Gateway, Zero...strategies, processes, and controls, and execution of the CIS Control cybersecurity platforms, and solutions. + Works on the… more
- PSEG (Bethpage, NY)
- …on (SSO), multi-factor authentication (MFA), data loss prevention (DLP) and identity and access management ( IAM ) * Knowledge of Endpoints, Servers, and Cloud - ... exciting time to join PSEG. **Job Summary** The Technology Product Consultant - supports IT Infrastructure platforms and technologies including Microsoft Exchange,… more
- UMB Bank (Columbus, OH)
- …included but not limited to AWS multi-accounts structure, Organizational Units, Service Control Policies (SCP), IAM policies, Virtual Private Cloud (VPC), AWS ... able to perform their jobs by granting the appropriate access . We collaborate with other technical teams to ensure...IAM Policies, AWS Tower, AWS Config, and Service Control policies (SCP). + You have demonstrated knowledge with… more
- Amazon (Seattle, WA)
- …of this role is to oversee and perform quality assurance and quality control process mapping for the review, tracking, and management of design drawings, ... organizations . The Applications Manager manages the intake of design consultant documentation and data, review documentation for quality compliance and… more