The #1 Site for IT and Engineering Jobs - search all IT and Engineering  jobs.
Id70x06n006mrjh9np4

Security Access Manager

Job Description

Stefanini is looking for a Security Access Manager in Richmond, VA
Responsibilities:This position requires advanced level technical knowledge and understanding of the installation, support, performance tuning and maintenance of IBM Security Verify Access (aka Security Access Manager). Provides collaborative or consultative work of areas of information security with varying complexity to provide support for design, implementation, production and activation of technology products related to IBM Security Verify Access. Directs use of appropriate processes and procedures are effective, enforced and meet standards and requirements. Coordinates, plans and executes solutions to meet information security needs of clients, work teams and/or internal or external organization management groups. May collaborate and/or coordinate with cross functional teams. Advanced level position is recognized as an advanced contributor and subject matter expert in field.
Knowledge: Advanced knowledge pertaining to concepts and principles in functional area. General knowledge of department/business lines, Banks, and / or System operations, policies, procedures and technologies.
Communications: Excellent organizational and communication skills, creativity, attention to detail (compliance), and negotiation skills to interpret results, develop communications and recommend improvements. Able to present information within all settings in a credible, confident and influential manner. Communicates in a concise, direct and purposeful way. Excellent customer service skills and demonstrated ability to interact with anticipated audiences in a courteous, service-oriented manner.
Risk Management: [The individual] is responsible for understanding and applying risk management discipline in decision making, and contributing to his or her functions risk management.
Decision Making: Works independently on broad assignments or under general directions as to scope or objectives. Makes decisions within established or widely accepted standards. Achieves assigned/planned results by decisions and actions based on professional methods, training, business principles, and practical experience.
Required Experience: * Design, installation, and configuration of IBM Security Verify Access * Experience with modern authentication and authorization protocols including: * OAuth 2.0 * Open ID Connect (OIDC) * Federation (SAML 2.0) * Identity as a Service (IDaaS)
Desired Requirements * Experience with Federated Repositories * Experience with System for Cross-domain Identity Management (SCIM) * Experience with RESTful API's * Experience with JavaScript * Experience with Python * Experience with Git (lab or hub) * Ansible

Job Requirements

Qualifications:1) Provides high level consulting services to clients in order to evaluate, recommend, design and implement information security solutions and process improvements in areas related to information security . 2) Anticipates client needs and identifies client requirements by establishing personal rapport with all clients and internal/external resources to understand business and information security requirements. 3) Demonstrates an in-depth knowledge of supported client areas and builds relationships by assessing, evaluating and fully understanding the needs and requirements of clients. 4) Advises clients and leaders on best practices and how to implement the necessary changes to address their business needs. Recommends alternatives and performs gap analysis to identify unaddressed needs. Reviews and assesses necessary data to be used in addressing the clients business and information security needs. 5) ) Lead strategic guidance initiatives and leadership to clients and leaders. 6) Anticipates leadership needs and is a key contributor in process improvement and long term information security solution discussions. Presents outcomes in written and verbal format to senior management and division management. 7) Directs initiatives and oversees project development surrounding new processes and the integrating of new processes with existing ones. Communicates these changes to impacted clients, other resources and senior management. 8) Performs other related duties as assigned .
Working Conditions: Will require the use of standard office equipment such as computers, phones, photocopiers, etc. Physical Demands: Requires some degree of sitting (for prolonged periods of time), standing, lifting carrying, pushing, pulling less than 20 lbs. Hours of Work: May require extended work hours. Occasional travel including overnight stays may be necessary. Bachelors Degree or equivalent experience/Masters Degree may be preferred with 10 years of relevant work experience.

Job Snapshot

Location US-VA-Richmond
Employment Type Contractor
Pay Type Year
Pay Rate $135,000.00 - $140,000.00 /Year
Store Type IT & Technical
Apply

Company Overview

Stefanini

Stefanini brings decades of IT outsourcing expertise to clients around the globe. We support mid-size and large corporations through offshore, onshore and nearshore IT managed services, systems integration, consulting and strategic staffing. Our service offerings include: IT infrastructure outsourcing (helpdesk/desktop services and data center), application development/systems integration, ERP/SAP consulting, asset management, and strategic IT staffing solutions. Our more than 24,000 employees delivering support in 35 languages, within 88 offices with a direct presence in 40 countries across the Americas, Europe, Africa, Australia and Asia is why our IT outsourcing solutions are used by some of the largest multinational companies in the world. Learn More

Contact Information

US-VA-Richmond
Jay Singh
(248) 263-8681
Snapshot
Stefanini
Company:
US-VA-Richmond
Location:
Contractor
Employment Type:
Year
Pay Type:
$135,000.00 - $140,000.00 /Year
Pay Rate:
IT & Technical
Store Type:

Job Description

Stefanini is looking for a Security Access Manager in Richmond, VA
Responsibilities:This position requires advanced level technical knowledge and understanding of the installation, support, performance tuning and maintenance of IBM Security Verify Access (aka Security Access Manager). Provides collaborative or consultative work of areas of information security with varying complexity to provide support for design, implementation, production and activation of technology products related to IBM Security Verify Access. Directs use of appropriate processes and procedures are effective, enforced and meet standards and requirements. Coordinates, plans and executes solutions to meet information security needs of clients, work teams and/or internal or external organization management groups. May collaborate and/or coordinate with cross functional teams. Advanced level position is recognized as an advanced contributor and subject matter expert in field.
Knowledge: Advanced knowledge pertaining to concepts and principles in functional area. General knowledge of department/business lines, Banks, and / or System operations, policies, procedures and technologies.
Communications: Excellent organizational and communication skills, creativity, attention to detail (compliance), and negotiation skills to interpret results, develop communications and recommend improvements. Able to present information within all settings in a credible, confident and influential manner. Communicates in a concise, direct and purposeful way. Excellent customer service skills and demonstrated ability to interact with anticipated audiences in a courteous, service-oriented manner.
Risk Management: [The individual] is responsible for understanding and applying risk management discipline in decision making, and contributing to his or her functions risk management.
Decision Making: Works independently on broad assignments or under general directions as to scope or objectives. Makes decisions within established or widely accepted standards. Achieves assigned/planned results by decisions and actions based on professional methods, training, business principles, and practical experience.
Required Experience: * Design, installation, and configuration of IBM Security Verify Access * Experience with modern authentication and authorization protocols including: * OAuth 2.0 * Open ID Connect (OIDC) * Federation (SAML 2.0) * Identity as a Service (IDaaS)
Desired Requirements * Experience with Federated Repositories * Experience with System for Cross-domain Identity Management (SCIM) * Experience with RESTful API's * Experience with JavaScript * Experience with Python * Experience with Git (lab or hub) * Ansible

Job Requirements

Qualifications:1) Provides high level consulting services to clients in order to evaluate, recommend, design and implement information security solutions and process improvements in areas related to information security . 2) Anticipates client needs and identifies client requirements by establishing personal rapport with all clients and internal/external resources to understand business and information security requirements. 3) Demonstrates an in-depth knowledge of supported client areas and builds relationships by assessing, evaluating and fully understanding the needs and requirements of clients. 4) Advises clients and leaders on best practices and how to implement the necessary changes to address their business needs. Recommends alternatives and performs gap analysis to identify unaddressed needs. Reviews and assesses necessary data to be used in addressing the clients business and information security needs. 5) ) Lead strategic guidance initiatives and leadership to clients and leaders. 6) Anticipates leadership needs and is a key contributor in process improvement and long term information security solution discussions. Presents outcomes in written and verbal format to senior management and division management. 7) Directs initiatives and oversees project development surrounding new processes and the integrating of new processes with existing ones. Communicates these changes to impacted clients, other resources and senior management. 8) Performs other related duties as assigned .
Working Conditions: Will require the use of standard office equipment such as computers, phones, photocopiers, etc. Physical Demands: Requires some degree of sitting (for prolonged periods of time), standing, lifting carrying, pushing, pulling less than 20 lbs. Hours of Work: May require extended work hours. Occasional travel including overnight stays may be necessary. Bachelors Degree or equivalent experience/Masters Degree may be preferred with 10 years of relevant work experience.
Sologig Advice

For your privacy and protection, when applying to a job online: Never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction.Learn More

By applying to a job using sologig.com you are agreeing to comply with and be subject to the workinretail.com Terms and Conditions for use of our website. To use our website, you must agree with theTerms & Conditionsand both meet and comply with their provisions.
Security Access Manager Apply now