Greetings!!!

Hope this email finds you in good times.
Kindly let me know if you have any suitable profile for below opening with
one of our direct client. Please share profiles at







* vis...@diverselynx.com <vis...@diverselynx.com>Job Title    : IAM /
Security AnalystLocation    : Raleigh, NCDuration    : 06+ MonthsRelevant
Experience  & Experience Required (in Yrs)    Minimum 4 – 6 years of
experience in the below technologiesCandidate’s core skills*
• Good knowledge of “Access Control” security domain
• Must be familiar with different authentication and authorization
mechanisms, such as, Active Directory, Windows, File shares, SharePoint
• Mainframe-RACF, UNIX, DB etc.
• Ability to interview large number of stakeholders and assess AS-IS access
control and security mechanisms of the application.
• Must possess analytical skills to perform research and analysis on large
data sets to identify usage patterns.
• Must be able to identify user access security gaps after conducting
interviews, workshops, data analysis.
• Must be able to leverage IAM knowledge to recommend mitigations and
suggest a strategy to close all the access security gaps.
• Must have worked on Access Governance tools to ensure the application’s
user access is reviewed periodically.
• Should have fairly good understanding of Access Groups, Application
Roles, RBAC Roles.

Good to have skills
• Working experience of one or more IAM tools, example, OIM/OIA, TIM (aka
ISIM), SailPoint IIQ
• Knowledge of AD based authentication and authorization
• Understanding of SSO and Federation concepts
• Experience of performing/conducting periodic user access reviews
• CISSP or CISA/CISM certification

Roles & Responsibilities
• Attend interviews, workshops with Business and Technology teams and
Information Security Teams.
• Understand and document as-is state of user access security of the
application.
• Analyze user access data and usage data to perform gaps analysis and
outlier analysis.
• Identity access security gaps.
• Provide Remediation recommendations and future state of user access
security.
• Justify changes required in the as-is state and obtain sign off from all
the stakeholders.
• Support and guide implementation of recommendations.
• Deliver Application Access Remediation document



*Thanks & Regards,Vishal Singh | Diverse Lynx LLC*
Contact: 732-452-1006 Ext-417 | Email: vis...@diverselynx.com
Gtalk: Connect.VishalSingh | Yahoo: Vishal_Singh7254
“for our open requirements, please visit Diverselynx Jobs

-- 
-- 
***************************************************************************************
For all SAP related tutorials,Articles,Faqs,Tips
          
          www.sapbrainsonline.com

****************************************************************************************

You received this message because you are subscribed to the Google Groups 
"sapbrains" group.
To post to this group, send email to sapbrains@googlegroups.com
To unsubscribe from this group, send email to 
sapbrains-unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/sapbrains?hl=en
--- 
You received this message because you are subscribed to the Google Groups 
"sapbrains" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sapbrains+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to