- TEKsystems (Des Moines, IA)
- … IAM risks, including access provisioning, de-provisioning, privilege escalation, and access control gaps or weaknesses. * Conduct risk assessments for ... Oversight Lead is responsible for ensuring that the organization's Identity and Access Management ( IAM ) practices adhere to regulatory requirements, internal… more
- Robert Half Technology (West Des Moines, IA)
- …corrections, etc. * Maintain documentation for the IAM program * Participate in IAM audits and review access control reports to identify potential risks ... offering a permanent employment opportunity for an Identity & Access Management Consultant in the Life Insurance...The role requires a deep understanding of Identity and Access Management ( IAM ) processes, including the creation,… more
- TEKsystems (Sioux Falls, SD)
- …corrections, etc. + Maintain documentation for the IAM program. + Participate in IAM audits and review access control reports to identify potential ... Top Skills' Details + 5+ years of experience in identity and access management, preferably with SailPoint. + Strong understanding of IAM concepts, including… more
- Wolters Kluwer (Philadelphia, PA)
- …+ Familiarity with cybersecurity best practices, such as encryption and access control . + Establish positive, collaborative relationships with client ... to deliver high quality and effective care. The **Sr. Technology Implementation Consultant ** will work within a cross-functional team of experts to develop and… more
- Deloitte (Columbus, OH)
- …Identity and Access Management ( IAM ) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients control which employees, customers, ... you'll do As Identity and Access Management ( IAM ) solutions team Solution Delivery Consultant , you...will: + Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards +… more
- TEKsystems (Columbia, MD)
- …security policies and procedures and refers problems as appropriate. * Monitors internal control systems to ensure that appropriate information access levels are ... and regulatory requirements. * Serves as a cloud security consultant to help project teams comply with enterprise and...Strong understanding of secure design and reviews, identity and access management. * Extensive hands-on knowledge of IAM… more
- Houston Methodist (Houston, TX)
- …standards - Monitor and troubleshoot IAM -related issues to ensure seamless access control - Collaborate with cross-functional teams to enhance security ... with scripting and automation - Knowledge of identity and access management ( IAM ) solutions - Familiarity with...five years in a senior level engineer, analyst or consultant role **LICENSES AND CERTIFICATIONS - REQUIRED** + At… more
- Advanced Systems Design (Tallahassee, FL)
- …user job functions and employment status; and + (d) Manage user attributes, roles for access control , and user profile information. + (2) Configure and maintain ... external audits. The ideal candidate should thoroughly understand the consultant role and demonstrate exceptional communication skills, ensuring respectful,...access control tools as follows. + (a)… more
- Infinitive Inc (Ashburn, VA)
- …and domain structure for enterprise-scale deployments. + Design and implement role-based access control (RBAC), privileged access management (PAM), and ... expertise in Microsoft Active Directory, Azure AD, Identity & Access Management ( IAM ), and related security best...+ Certified Azure Security Engineer Associate + Okta Certified Consultant or AWS Certified Security - Specialty Powered by… more
- PSEG (Bethpage, NY)
- …on (SSO), multi-factor authentication (MFA), data loss prevention (DLP) and identity and access management ( IAM ) * Knowledge of Endpoints, Servers, and Cloud - ... exciting time to join PSEG. **Job Summary** The Technology Product Consultant - supports IT Infrastructure platforms and technologies including Microsoft Exchange,… more
- Shuvel Digital (Dallas, TX)
- …Authentication. + Implement OKTA Universal Directory and configure group policies for access control and user provisioning. + Troubleshoot SSO, MFA, SCIM, ... in Active Directory (AD) to support our Identity and Access Management ( IAM ) infrastructure. The ideal candidate...between OKTA and Active Directory. + Implement RBAC (Role-Based Access Control ) and group management policies. Cloud… more
- Amazon (Austin, TX)
- …of this role is to oversee and perform quality assurance and quality control process mapping for the review, tracking, and management of design drawings, ... organizations . The Applications Manager manages the intake of design consultant documentation and data, review documentation for quality compliance and… more
- Amentum (San Antonio, TX)
- …these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG). + Recommend the components to implement system ... with the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF. + Assist with POA&M… more
- HCA Healthcare (Nashville, TN)
- …Cloud. + Strong understanding of data security, including encryption, identity and access management ( IAM ), and data privacy regulations. + Familiarity with ... with organizational standards and policies. + Serve as a security consultant to define security requirements, advise on secure application and infrastructure… more