[Close] 

Information Security Analyst Sr

Company Name:
The Proven Method
Identity and Access Management Senior or Above
Summary of
job
Function
The Information Security Identity and Access Management (IAM) group is responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies.
This
position
focuses on the implementation, security, and maintenance and access administrationof the Enterprise Federated Identity and Access Management Single Sign On solution.
Plan, architect, and integrate various technologies with the IAM enterprise solutions. Provide operational maintenance and support of the enterprise solutions and integrated technologies. Plans and evaluates new and existing technologies for integration with IAM enterprise solutions. Recommend resources required for maintaining or expanding service levels. Works closely with clients to analyze problems and implement solutions. Assist
supervisor
in providing estimates of work effort and impact of projects and tasks. Understand and support the technologies that are within their specific discipline while also understanding the philosophies, impacts and processes of the group as a whole. Understand, adhere and enforce departmental and Corporate Security standards, policies and procedure.
Essential Responsibilities
Under limited supervision, performs all of the functions within the Enterprise Identity and Access Management solutions:
Must have knowledge of all areas of the IAM Enterprise Solutions.
Lead and participate in the architecture, development and configuration of IAM solutions and assigned technologies to include documenting requirements, design and implementation activities
Lead and participate in the architectural analysis of solutions to prioritize and determine feasibility of future integration with IAM technologies
Identify and design ways to streamline or improve efficiency of assigned tasks as well as presenting recommended solutions to management.
Identify and mitigate risk while adhering to corporate and departmental change control procedures
Must be proficient in troubleshooting problems. Must be able to isolate problems in a timely manner and resolve them to the satisfaction of the client.
Responding to and processing incoming requests in a courteous, timely manner while adhering to all policies
Proactive communication and escalation of issues to management
Manage projects and tasks as well as report on progress through required methods
Subject matter expert and author of Standard Operations Procedures (SOP)
Educate team members and business units on IAM methodologies and benefits
Providing ad-hoc reports as need on assigned systems or applications
On Call Support for assigned systems and applications
Other duties as assigned
Required Knowledge, Skills and Abilities
Teamwork
Collaborate in a team environment
Deliver quality customer service
Adaptability
Portray a positive attitude.
Flexible
Accept supervision/guidance
Focus on day-to-day processes.
Compile with company standards, policies and procedures.
Display professionalism in both conduct and dress.
Organization
Manage time and priorities.
Attend to detail.
Multitask orientated.
Communication
Ask for help and/or seeks advice.
Listen well and utilize information.
Contribute/share ideas and information.
Effective oral and written communication
Decision Making
Recognize problems and issues.
Act quickly to carryout appropriate decisions.
Exhibit effective problem solving skills.
Job Specific Competencies
Takes initiative
Excellent customer service skills
Ability to develop and implement idea to improve process workflow
Ability to understand internal/external customer expectations
Thinks analytically
Training and mentoring skills
Excellent research skills
Excellent problem resolution skills
Excellent knowledge of assigned system or subsystem
Excellent project management skills
Manages multiple projects
Identity Management
Federation
Single Sign On (SSO)
IBM Tivoli Identity
manager
(TIM)
IBM Tivoli Access Manager (TAM)
IBM Tivoli Directory Integrator (TDI)
IBM Tivoli Federation Identity Manager (TFIM)
SAML 2.0
UNIX
LDAP
Scritpting (JavaScript, ShellScript)
C/C++
Active Directory
MQ
SQL
Websphere
IBM HTTP Server
SSL
Working Conditions
Some travel
Use of a pager when on call
Additional work outside regularly scheduled/normal business hours may be required
Education/Experience
Required:
Senior - Must have a four year college degree and 4 or more years professional experience or 6 or more years related experience. Requires a strong working knowledge of various security technologies and concepts. The ability to pass and maintain a government level Secret clearance is required to be a member of the Mainframe Security, Enterprise IAM and Identity Administration teams. Highly motivated self-starter and the ability to work in a secure and cooperative manner with other team members and TSYS departments is required.
Specialist - Must have a four year college degree and 6 or more years professional experience or 8 or more years professional experience is required. The successful candidate will demonstrate a strong working knowledge of security technologies as well as a possession of excellent communication and presentation skills. The ability to pass and maintain a government level Secret clearance is required to be a member of the Mainframe Security, Enterprise IAM and Identity Administration teams. Highly motivated self-starter and the ability to work in a cooperative manner with other team members and TSYS departments is required.
Consultant - Must have a four year college degree and 8 or more years professional experience or 10 or more years professional experience as well as a professional security certification (such as CISSP, CRISC, GSEC...etc). The successful candidate will demonstrate an expert level of knowledge in security technologies as well as possession of excellent communication, documentation and presentation skills. The ability to pass and maintain a government level Secret clearance is required to be a member of the Mainframe Security, Enterprise IAM and Identity Administration teams. Highly motivated self-starter and the ability to work in a secure and cooperative manner with other team members and TSYS departments is requi

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.