Scope of the Project
The Security Identity and Access Management Engineer will support the Division of Information Security through the implementation, integration, and operationalization of security technologies. The role includes developing automation between security tools, contributing to security architecture, and participating in strategic planning, design, and secure implementation of new or updated systems. This engagement is expected for 12 months with potential extension.
Daily Duties / Responsibilities
- Manage Identity and Access Management (IAM) including Identity Management, SSO, MFA, Active Directory, and application configurations to support IT and security operations.
- Develop and implement automation across various security and enterprise IT tools.
- Plan, design, develop, and implement enterprise-level security solutions aligned with business goals and risk tolerance.
- Deploy and manage countermeasures for known security threats and create preventative strategies for emerging threats.
- Ensure consistent application of security controls across business applications and infrastructure environments.
- Take appropriate actions to protect state data and technology services.
Required Skills (Ranked)
5+ years expert experience in Identity & Access Control, logging, and reporting systems5+ years in automation development (Python, Bash)Strong cybersecurity awareness and understanding5+ years experience with Linux, Windows, network security protocols, and procedures5+ years supporting large IT environments and / or systems deploymentsPreferred Skills (Ranked)
SIEM analysis and reportingKnowledge of security frameworks (NIST, CSF, CJIS, IRS 1075, CMS MARS-E)pplication Security (AppSec)Required Education / Certifications
Bachelor's degree in Information Technology or Information SecurityOR
8 years of relevant work experience in lieu of a degreePreferred Education / Certifications
CISSP, CISA, CISO, or equivalent advanced security certificationsdditional certifications such as CEH, OSCP, GPENVendor certifications in SIEM or logging technologiesInterview Process
Initial interview via Microsoft Teams (on camera)In-person interviews preferred before final selection