• img
  • img
  • img
Job Overview
Job ID:J316989
Job Title: Access Management Engineer
Client: To Be Discussed Later
Location:Easton, Maryland
Contract Duration:6 Months
Hourly Rate: $45/hr Corp-to-Corp Contract
Experience Level: 7+ Years
Interview Type: Phone + Skype
Domain Exposure: Healthcare, IT/Software
Work Authorization: US Citizen, Green Card, H-1B, GC-EAD, H4-EAD, OPT-EAD, L2-EAD, TN Visa
Preferred Employment: Corp-To-Corp Contract, 1099/ Contract
Current Status: Open

Local Candidates Preferred. Non-local candidates must be willing to pay for your own interview travel expenses and relocation costs
**Candidates submitted over the max. bill rate will be automatically disqualified and counted as a submittal. For each position CBD allows only 2 (two) submittals from our
     sub-vendors/partners. So please send us only the exact matching profiles for better chances of shortlisting and quick response.
Job Description

Role : Junior Identity/Access Management Engineer

Location :Easton,MD

Duration : 6+ Months

Rate : $45/hr On C2C 

Job Description : 

Local Preffered but might hire off Skype

MUST HAVE: Tivoli IAM, IBM Security Access Manager AND Healthcare IT Experience

Security Computer Systems Specialist : Healthcare exchange ++++

The Maryland Health Benefit Exchange (MHBE) created a website and call center operating under the name Maryland Health Connection (MHC). Through MHC, Maryland residents explore health insurance plans, compare rates, and determine their eligibility for advanced premium tax credits (APTC), cost sharing reductions (CSR) and public assistance programs such as Medicaid and the Maryland Childrens Health Insurance Program (MCHP).
MHBE seeks one resource to provide IBM Security Identity Manager (ISIM) and IBM Security Access Manager for Web (ISAM) administration and security support services.

Install and configure Identity and Access Management and IBM Security Identity products.
Deploy and administer IBM Security Access Manager.
Perform monitoring and operations of Identity and Access Management implementation.
Design, develop and test security enhancements in ISIM and ISAM.
Perform configuration and administration of ISIM and perform tasks such as design an organizational tree structure and create provisioning and de-provisioning policies.
Implement: ID policies, password policies, access control lists (ACL), reconciliation, service definition, configuration of remote resources, workflows, password synchronization, reconciliation scheduling, and life cycle management.
Provide detailed configuration and administration for programs such as, ISAM - ACL configuration, Group Management, and WebSeal configuration management.
Develop Tivoli Directory Integrator Scripts for reporting.
Implement integration solutions between ISIM and user account repositories such as Active Directory, Linux and Databases.
Provide operational support for other security technologies.
Perform account/access management with IAM tools.
Perform Security Incident Response and Forensics evaluation using security information and event management (SIEM) tools.
Provide support for audit responses in accordance with organizational requirements.
Provide security operations support to business teams.
Provide security team work management coordination.


Education:

Bachelors Degree from an accredited college or university in Engineering, Computer Science, Information Systems, Business or other related Discipline. Masters degree preferred.

Minimum Qualifications:


A minimum of 6 years of experience in IT Security related assignments.
A minimum of 5 years of hands-on experience in ISIM and ISAM administration.
A minimum of 2 years of hands-on experience with operational support for ISIM and ISAM.
A minimum of 2 years performing day-to-day operational functions including administration, troubleshooting, and resolution of all ISIM/ISAM components.
A minimum of 2 years of hands-on experience with detailed configuration and administration of ISIM and ISAM.
A minimum 2 years of development experience with IBM Tivoli Directory Integrator.
Experience with Windows and Linux operating systems.
Demonstrated ability to perform scheduled maintenance activities such as patching, performance tuning and backups.
Demonstrated ability to perform User provisioning and de-provisioning activities.
Experience in monitoring the security infrastructure for operational effectiveness.
Experience in performing Security Incident Response and Forensics evaluation with SIEM Tools.

Preferred Qualifications:

IBM Certified Deployment Professional Certifications with ISIM and ISAM are preferred.
Experience with Java, JavaScript and shell scripts.
Experience developing IT Security roadmaps and execution plans.
Hands-on experience with troubleshooting, investigating operational problems and providing workarounds and resolution/remediation.
Demonstrated understanding of information security concepts and regulatory compliance requirements.
Experience working as a part of an IT Security team performing security assignments beyond Identity and Access Management.
Demonstrated technical knowledge of command line utilities running on various platforms including Linux and MS Windows.

 

Equal Opportunity Employer

Cloud Big Data Technologies is an equal opportunity employer inclusive of female, minority, disability and veterans, (M/F/D/V). Hiring, promotion, transfer, compensation, benefits, discipline, termination and all other employment decisions are made without regard to race, color, religion, sex, sexual orientation, gender identity, age, disability, national origin, citizenship/immigration status, veteran status or any other protected status. Cloud Big Data Technologies will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal opportunity, employment eligibility requirements or related matters. Nor will Cloud Big Data Technologies require in a posting or otherwise U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract
Apply Now
img img img img img
Conditions of Use | Privacy Notice | © Copyright 1998-2024, Cloud Big Data Technologies or its affiliates