Greetings!!! Hope this email finds you in good times. Kindly let me know if you have any suitable profile for below opening with one of our direct client. Please share profiles at
* vis...@diverselynx.com <vis...@diverselynx.com>Job Title : IAM / Security AnalystLocation : Raleigh, NCDuration : 06+ MonthsRelevant Experience & Experience Required (in Yrs) Minimum 4 – 6 years of experience in the below technologiesCandidate’s core skills* • Good knowledge of “Access Control” security domain • Must be familiar with different authentication and authorization mechanisms, such as, Active Directory, Windows, File shares, SharePoint • Mainframe-RACF, UNIX, DB etc. • Ability to interview large number of stakeholders and assess AS-IS access control and security mechanisms of the application. • Must possess analytical skills to perform research and analysis on large data sets to identify usage patterns. • Must be able to identify user access security gaps after conducting interviews, workshops, data analysis. • Must be able to leverage IAM knowledge to recommend mitigations and suggest a strategy to close all the access security gaps. • Must have worked on Access Governance tools to ensure the application’s user access is reviewed periodically. • Should have fairly good understanding of Access Groups, Application Roles, RBAC Roles. Good to have skills • Working experience of one or more IAM tools, example, OIM/OIA, TIM (aka ISIM), SailPoint IIQ • Knowledge of AD based authentication and authorization • Understanding of SSO and Federation concepts • Experience of performing/conducting periodic user access reviews • CISSP or CISA/CISM certification Roles & Responsibilities • Attend interviews, workshops with Business and Technology teams and Information Security Teams. • Understand and document as-is state of user access security of the application. • Analyze user access data and usage data to perform gaps analysis and outlier analysis. • Identity access security gaps. • Provide Remediation recommendations and future state of user access security. • Justify changes required in the as-is state and obtain sign off from all the stakeholders. • Support and guide implementation of recommendations. • Deliver Application Access Remediation document *Thanks & Regards,Vishal Singh | Diverse Lynx LLC* Contact: 732-452-1006 Ext-417 | Email: vis...@diverselynx.com Gtalk: Connect.VishalSingh | Yahoo: Vishal_Singh7254 “for our open requirements, please visit Diverselynx Jobs -- -- *************************************************************************************** For all SAP related tutorials,Articles,Faqs,Tips www.sapbrainsonline.com **************************************************************************************** You received this message because you are subscribed to the Google Groups "sapbrains" group. To post to this group, send email to sapbrains@googlegroups.com To unsubscribe from this group, send email to sapbrains-unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/sapbrains?hl=en --- You received this message because you are subscribed to the Google Groups "sapbrains" group. To unsubscribe from this group and stop receiving emails from it, send an email to sapbrains+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.