- University of Rochester (Rochester, NY)
- …equity considerations._ **Responsibilities:** GENERAL SUMMARY Designs, implements, and manages IAM (Identity and Access Management) solutions using SDLC (Software ... Life Cycle) best practices. Configure IGA (Identity, Governance and Administration ) tools to automate JML (Joiner/Mover/Leaver) processes, including Access Request… more
- TD Bank (Mount Laurel, NJ)
- …strategy and technology roadmaps. + Understand business, application, and security requirements for Provisioning & Identity Management services and translate ... of our engineering projects and solutions in collaboration with operations, information security , architecture, and project managers. + Serve as third and last line… more
- NTT America, Inc. (Plano, TX)
- …and automation tools (Terraform, CloudFormation, ARM templates, etc.). Familiarity with cloud-native security best practices ( IAM , network security , data ... architects in providing managed cloud services (monitoring, support, optimization, and administration ) across AWS, Azure, Google Cloud Platform (GCP), and Oracle… more
- Robert Half Technology (Dallas, TX)
- Description We are looking for an experienced IAM Engineer to join our team in Dallas, Texas, on a Contract to permanent employment basis. In this role, you will ... centralizing user access management across various brands, ensuring seamless integration and security within our systems. This position requires expertise in Okta … more
- Robert Half Technology (Poughkeepsie, NY)
- Description We are looking for an experienced IAM Project Manager to lead our Identity and Access Management enhancement initiatives. This long-term contract ... will play a pivotal role in driving automation, compliance, and security improvements across the organization. Responsibilities: * Oversee the implementation of… more
- BayCare Health System (Clearwater, FL)
- …reside in Florida OR be willing to relocate_** **Responsibilities:** + Serves as an administrative and operational member of the IS Security team. Performs daily ... operational efficiency. + Involved in the development and enhancement of administration methodologies utilizing security best practices, automation, auditing,… more
- Microsoft Corporation (Redmond, WA)
- …+ Familiarity with security practices in infrastructure environments, including IAM , OAuth, and Kerberos administration . + Proven experience with ... layers. + Partner with Security teams to enhance system security ( IAM , OAuth, Kerberos). + Embody and promote Microsoft's values: Respect, Integrity,… more
- Truist (Raleigh, NC)
- …Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications ... every phase of the SDLC and software stack, with an emphasis in IAM -Identity Services. Design, plan, test and implement phases of cybersecurity technology projects.… more
- ManpowerGroup (Washington, DC)
- …including TLS/SSL, S/MIME, 802.1x, Smartcards, and Code Signing. + Collaborate with IAM , Infrastructure, Security , and Application teams to integrate PKI into ... to create, evolve, and secure internal PKI and credential management security strategy. + Design, implement, and operate enterprise-grade PKI solutions, including… more
- SLAC National Accelerator Laboratory (Menlo Park, CA)
- …architecture of AI systems in a cloud context (AWS best practices for security , cost optimization, IAM , networking, governance). + Work with DevOps/platform ... + Understanding of cloud architecture best practices (AWS), including networking, security ( IAM , encryption, VPC, roles), cost optimization, and performance… more