Mid-level (3 to 4 years), Senior (5 to 8 years)Experience Level
Full TimeJob Type
UnknownVisa
Payments, Financial Services, FinTechIndustries
Requirements
Bachelor's degree in computer science, information technology or related field
Strong background in identity and access management (IAM)
Extensive experience with SailPoint IIQ implementation, customization, and support
Responsibilities
Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, firmware and software
Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents
Investigates and resolves security incidents and recommends enhancements to improve security
Collaborates with clients to understand their business requirements and design SailPoint IIQ solutions that address their identity governance needs
Leads the implementation of SailPoint IIQ, including installation, configuration, and customization based on client specifications
Develops and maintains custom workflows, connectors, and integration points to ensure seamless integration with existing systems and applications
Provides technical expertise and guidance to clients throughout the entire project lifecycle, from initial design to post-deployment support
Troubleshoots and resolves complex technical issues related to SailPoint IIQ implementation, performance, and integration
Conducts system testing, performance tuning, and optimization to ensure the stability and scalability of SailPoint IIQ deployments
Collaborates with cross-functional teams, including developers, architects, and security professionals, to deliver integrated IAM solutions that meet business objectives
Stays current with industry trends and best practices in identity governance and access management to continuously enhance service offerings
Manages incident handling processes which include implementation of containment, protection and remediation activities
Keeps up-to-date knowledge of new and emerging threats that can affect the organization's information assets by analyzing third party software/solutions, IT configuration changes (including access control requests), and network/system architecture from risk perspective
Responsible for the design and configuration of security systems, including proxy, remote access, mail gateway, intrusion prevention, wireless networking, data leak prevention, security information and event management and web application firewalls
Guides on creating cost effective solutions for system/application development regarding Information Security processes and concepts in applicable systems and software
Performs day-to-day Information Security functions pertaining to computer security software products and processes
Works closely with subject matter experts and management to develop skill set for non-routine work
Enhances understanding of business objectives and helps providing direction based on risk, Corporate Security Policy, and association and regulatory guidelines