Website GenixCyber
Position Summary
This position is expected to have hands-on experience in a fast-paced environment, working with Business and Internal customers to develop and deploy complex solutions in Saviynt IGA solution. Expectations also include a deep debugging and issue triaging skills to mitigate risks, resolve issues and deliver modern IGA solution.
Qualifications
🔹5+ years of experience developing Identity Governance and Administration (IGA) strategies, architecture, and implementation
🔹5+ years of hands-on experience in design, development and implementation of Identity Governance and Administration (IGA) solutions Experienced with Saviynt products and platforms.
🔹5+ years of experience in implementing enterprise Identity Management and security solutions, specifically with Saviynt Enterprise Identity Governance & Administration (EIGA) product suite.
🔹Ability to Implement/Customize Saviynt, Forms, Rules, Provisioning and Certifications
🔹Should be able to support deployment activities to production.
🔹Should have a clear understanding of ITSM framework and usage of ServiceNow
🔹Strong experience in Java, J2EE, and XML programming languages
🔹Strong understanding and development knowledge of RESTful Web Services and JDBC
🔹Strong Secure scripting/coding experience
🔹Understanding of how to set up connectors and user access reviews
🔹Advanced development skills to integrate applications to Saviynt using both customized and out of the box connectors
🔹Advanced experience with automating user provisioning and reporting using industry standard platforms and programming language (Powershell, Python, Ansible, Terraform, etc.)
🔹Familiarity with data privacy concepts, fraud detection and integration technologies
🔹Experience with Identity Management, Access Management, and Directory Services technologies including LDAPv3, SQL and noSQL technologies.
🔹Strong knowledge of OAuth, OpenID Connect, and SAML
🔹Experience with Web Services, SCIM, ODBC, and other supported connectors
🔹Experience in Databases (Oracle, MSSQL, Sybase)
🔹Experience with Networking (firewalls, TCP/IP, OSI, WAF, etc.),
🔹Building and using web APIs (XML/JSON/REST/SOAP, ESB/CRM/OMS)
🔹Leverage scripting and/or coding skills to automate processes
🔹Establishing and reporting actionable and meaningful metrics
🔹Should have knowledge on working with multiple active directory domains
🔹Experience with security compliance, governance, audit, and risk management.
🔹Working knowledge of cloud-based systems, virtualization, container orchestration, and common application architectures
🔹Building use cases and sequence diagrams
🔹Working experience on cloud environment like AWS, Azure, Google Cloud Platform
🔹Proven experience leading projects in complex customer environments
Experience in Professional Services organizations
Great interpersonal skills: good written & oral communication in English, ability & willingness to work within international team, collaborative & team-oriented approach, being self-driven with an ability to quickly adapt to new technologies and variables in a dynamic and fast-moving, large-scale project with tight deadlines, multiple priorities and under defined budget, high attention to details and quality. Strong communication skills and ability to work with customers and internal development teams.
🔹Ability to work across multiple projects simultaneously
🔹A bachelor’s degree in project management, engineering, computer science, informational technology, or related fields
🔹Previous Consulting Or Big 4 Experience Preferred
🔹Experience of strong experience of Privileged Access Management (PAM) and/or Customer Identity & Access Management (CIAM) products and solutions is a plus
🔹Certifications such as: CISSP, CCSP, CISM, or CISA certification a plus.
Responsibilities / Job Description
🔹Build IGA use cases such as Joiner, Mover, Leaver, Access Reviews/Attestation Campaigns, Access Request, Password Management, Delegated Administration and more
🔹Build advanced workflows and identity processes as needed for the client engagements
🔹Build Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) models
🔹Build Role Mining and Role Engineering system for advanced RBAC and ABAC model implementation
🔹Build Rule based provisioning and deprovisioning engine as part of the solution using Saviynt.
🔹Integrate IGA solution with Workforce Access Management solution for authentication and authorization needs
🔹Integrate IGA solution with Privileged Access Management solution such as CyberArk or Delinea (Thycotic) based on the use case
🔹Designing processes for how new users should be onboarded to downstream application platforms
🔹Performs hands on development for onboarding new applications to Saviynt and provide operational support for implemented solutions.
🔹Understanding and evaluating complex applications
🔹Evaluates systems and provides solutions to onboard complex applications to the Saviynt or SailPoint environments
🔹Configure, develop, and operate IGA infrastructure and solution
🔹Evaluating, improving, and maintaining client’s internal workforce user experience.
🔹Work with product, engineering, security, and operations teams to design, develop, and implement enterprise-wide IGA and Access Management solutions
🔹Works closely with other Identity team members and other technical teams in coming up with technical designs
🔹Engages with the vendor partner onsite/offshore to executes enhancements, perform code reviews
🔹Assists in the definition of requirements, provides estimates for the work effort required
🔹Troubleshoots IGA system component failures as they occur and provides solutions
🔹Adheres to design and coding standards as established and enforces the same when working with vendor partners
🔹Follows test driven development for new integrations build as well as modifying existing integrations
🔹Follows client’s change management and communication process and procedures
🔹Research and adopt new technologies
🔹Write and review technical solution designs
🔹Working closely with other teams and tools including Partner and Customer Experience, you will help to mature the Identity program at our clients
🔹Continually seeks ways to automate redundant functions to improve quality and efficiencies of tasks.
🔹Documents standards, architecture, implementation procedures, and troubleshooting.
🔹Collaborate closely with the various global Security, Information Technology, BU, and application teams to ensure IGA, IAM tools, configurations, and industry best practices are implemented uniformly across the enterprise
🔹Responsible for training, mentoring, directing, and validating the work of less experienced/knowledgeable team members
🔹Perform additional work as requested