Identity and Access Management Architect

Engineering Philadelphia, Pennsylvania


Description

The Identity and Access Management Architect offers a great opportunity to work within various complex IT Security environments throughout the mid-atlantic region (southern NJ, PA, DE, MD, DC, VA, WVA, and NC) to provide solutions to various prospects/customers across numerous vertical markets (for example, healthcare, financials, technology, legal, local government, etc.).  The IAM Architect has an in-depth working knowledge and proven experience working with privileged identity management solutions. This person should have a demonstrated ability to work effectively with various IAM information security tools in a large, complex, multi-platform environment. IAM will typically include working knowledge in some (or all) all of the following areas: User account repository - a central repository of user account information that a number of different systems can access, enabling centralized control of user accounts.

Position Requirements:

  • User role definitions - the grouping of users by function, or role, enabling role-based permissions and access authorization.
  • Single-sign-on - technology that enables users to sign on and authenticate themselves once, then access multiple resources without re-authenticating.
  • Password synchronization - a system that synchronizes the passwords for a user on many different systems and keeps them synchronized through simultaneous password changes on all systems.
  • Account provisioning and deactivation.
  • Authorization management - a system for managing user access to resources by user, group or role.
  • Delegation - the ability to delegate user management to a person or group with all the associated workflow and review/approval processes.
  • Federation - the ability to delegate user management to an external user or group (For example, a health insurance company will federate user management to each company’s benefits administrator).
  • User management workflow - the ability to define a process for user management that includes multiple levels of delegation, review and approval.
  • Authentication - a system for authenticating users against credentials, typically stored in a repository.
  • Authorization - a system for evaluating whether a specific user may access a specific resource in a specific manner.
  • Auditing - a system for recording user access to resources for security purposes.

Roles and Responsibilities:

  • The IAM Architect is responsible for maintaining the application layer of the product suites. Activities will typically include:
    • Ensuring full operability of the application o Creation of policies as defined by Risk/Audit/IT Security
    • Execution of project tasks defined by the SME in the design/architecture phase
    • Execution of daily tasks, support tickets, and provisioning tasks as assigned or routed via the ticketing system
  • Applies knowledge, skills and abilities to implement a process or procedure, timely and professionally.
  • Communicates project status and escalates issues as needed.
  • Works on special projects as assigned.

Education and Technical Requirements:

  • B.S. degree in computer science, management information systems, or equivalent experience
  • 2-5 years relevant experience supporting CyberArk or equivalent solutions
  • Possess good working knowledge and understanding of Windows credential stores such as Microsoft Active Directory and their related security capabilities and functions.
  • Working knowledge of Microsoft application software (i.e., Word, Excel, Visio and Project)
  • Working knowledge of typical application life cycle development processes
  • Proven organizational skills with the ability to develop a detailed work plan to ensure project success.
  • Demonstrated problem solving skills and the ability to work collaboratively with other departments to resolve issues.
  • Possess excellent written and verbal communication skills.
  • Strong requirements elicitation and conflict resolution skills.
  • Ability to self-direct and work independently.
  • Ability to work in a fast-paced environment, handling multiple priorities.

Why GuidePoint?

GuidePoint Security is a rapidly growing, profitable, privately-held value added reseller that focuses exclusively on Information Security. Since its inception in 2011, GuidePoint has grown to over 200 employees, established strategic partnerships with leading security vendors, and serves as a trusted advisor to more than 1,000 clients.

Firmly-defined core values drive all aspects of the business, which have been paramount to the company’s success and establishment of an enjoyable workplace atmosphere. At GuidePoint, your colleagues are knowledgeable, skilled, and experienced and will seek to collaborate and provide mentorship and guidance at every opportunity.

This is a unique and rare opportunity to grow your career along with the one of the fastest growing companies in the nation.

 Some added perks….

  • MacBook Air or Pro
  • Healthy mobile phone and home internet allowance
  • 100% employer-paid medical and dental with generous employer family contributions
  • Eligibility for retirement plan after 2 months at open enrollment

Equal Opportunity Employer

GuidePoint Security, LLC is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability status, marital status, sexual orientation, gender identity, genetic information, protected veteran status, or any other characteristic protected by law.

In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.