Manager
INDIA, Chennai
Applications have closed
Experience
2.5-5 Years
Skill (Primary)
INFORMATION SECURITY-WEB ACCESS MANAGEMENT OPERATIONS-IBM SECURITY ACCESS MANAGER Ops.
Qualification
B-Tech
Location
Chennai
Job Description (Posting).
JD for IBM ISIM/ISAM
Implementation of complex IAM solutions for large scale customers across various industry verticals
Play active role in the execution of the project and demonstrate strong technical leadership
Demonstrate a general knowledge of market trends and competition
Demonstrate the capabilities in understanding the clients' business environment and map the requirements into IAM solutions and proactively suggest alternatives as and when required
Be a strong team player
Required Skills
o Experience in deployment and implementation/support of IBM Tivoli Identity Manager Solution
o Experience in deployment and implementation/Support of IBM Access Manager Solution
Good understanding of LDAP concepts and working experience with at least few of the following directories:
o Oracle Internet Directory/Oracle Virtual Directory
o Sun Directory Server
o Active Directory
o Tivoli Directory Server
o Novell Directory Server
o CA Directory
Experience and exposure in RBACx, Compliance solutions, Access certifications solutions is an added advantage
Experience working with Application Servers ( WebLogic , Websphere) or developing J2EE products.
Should have the ability to understand customer scenario and requirements (may include integration situations) and be capable of suggesting solutions.
Should have good knowledge on current IDM, Strong Authentication and PKI (Public Key Infrastructure) technologies and products
Excellent communication skills and ability to work with global counterparts.
Qualifications:
7+ years of strong IAM implementation experience
Strong oral , written communications skills
Customer Facing Exposure is must
CISSP certification is a bonus
Open to travel requirements
(1.) To clearly understand the client's cybersecurity environment and respective product. (2.) To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools (3.) To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection (4.) To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team. (5.) To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes. (6.) To implement changes, monitor security device performance and implements performance tuning when necessary. (7.) To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory CISSP Compliance IAM LDAP Monitoring Oracle PKI
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.