Tech Stack
AWSAzureCloudCyber SecurityOracle
About the role
- Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated
- Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems
- Conducts vulnerability scans, analyzes findings and makes recommendations to mitigate or eliminate vulnerabilities
- Identifies systemic issues from vulnerability findings, configuration assessments, and derived metrics
- Troubleshoots hardware/software interfaces and interoperability between integrated systems
- Integrates and aligns cybersecurity system configurations to meet documented requirements
- Conducts and/or supports authorized penetration testing on enterprise assets
- Designs hardware, operating systems, and software applications to address cybersecurity requirements
Requirements
- Key technical contributor to the strategy, design, engineering, and management of the enterprise IGA solution
- Implement IGA processes: plan, design, and implement Access Reviews, Compliance Reporting, Access Control Processes, role-based access control
- Build a strong IAM foundation and integrate IAM systems with in-house, third party, and SaaS applications for identity governance functions
- Design, develop, test, implement, and document IAM solutions to meet program requirements
- Translate high level requirements into detailed technical designs and lead design sessions
- Develop documentation to support ongoing IAM systems operations, maintenance, and problem resolution
- Extensive, hands-on experience with leading IGA products (Saviynt, SailPoint IdentityIQ, SailPoint Identity Security Cloud, Oracle Access Governance/OIM)
- Strong development experience implementing all core capabilities of an IGA solution
- Experience preparing product documentation, test cases, test plans, and user guides
- Deep knowledge of agile processes and workflows
- Nice to have: Knowledge of Access Management products (MS Entra/Okta/Ping), Cloud platforms (Oracle Cloud, Azure, AWS), Privileged Access Management (CyberArk/Delinea), Working knowledge of Active Directory concepts
- 5-8 years of cybersecurity work experience required (minimum 5 years)