We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats. We are a community-driven nonprofit responsible for industry leading best practices for securing IT systems and data. The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. This position will provide exceptional service to all customers, ensuring ongoing satisfaction and retention and representing CIS in a professional and courteous manner, including travel to events. View The primary purpose of this position is to identify prospects and build relationships to acquire and retain customers for CIS Cloud solutions. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to the job. In addition, Sterling is committed to taking affirmative action to employ and to advance in employment individuals regardless of race, color, religion, creed, national origin or ancestry, ethnicity, sex (including pregnancy, childbirth or related conditions), gender identity and expression, age, marital status, disability, citizenship, sexual orientation, military service and genetic information and to base all employment decisions only on valid job requirements.ĭisclaimerThis job description has been designed to indicate the general nature and level of work performed by employees within this classification. You will work with business stakeholders and application owners to implement Identity Management processes for critical business applications and functions.This Is The Job For You If You: If you have the technical skills and desire to build an Identity Management function from the ground up, and you:Like to create from scratch and can take a hands-on approach to Identity and Access Management processes, building and scripting as needed along the way, to enable a robust and auditable Identity Management program.Can work with all stakeholders, end-users, technology owners, and business owners, in the development of procedures necessary to ensure seamless access management.Are extremely familiar with the Azure Active Directory and Microsoft 365 technology platforms.Understand the needs and requirements of an auditable Identity Management program under various audit programs, including ISO 27001:2013, SSAE SOC 2, and others.Can self-direct and remain productive in a virtual-first company.This Is What We're Looking For: Demonstrated history of experience and success in an Information Security or Identity and Access Management role.Experience with scripting required for identity automation, such as through PowerShell, SQL, or other scripting languages.In-depth knowledge of Microsoft access control technologies, including Microsoft 365, Active Directory, Azure Active Directory, and Azure Enterprise Application management processes.You have the skills necessary to complete Microsoft exams like MS-100, MS-101, AZ-104, AZ-500.You are familiar with single sign-on technology platforms, and the maintenance and configuration of SSO applications and identities in the Microsoft Azure environments.You are comfortable with both Azure and AWS identity management and access management processes.A 3+ year background with Information Security and Identity and Access Management using primarily Microsoft technologies, through a combination of work experience and relevant education.įollow us:Equal Employment Opportunities at Sterling Sterling is an equal opportunity employer and prohibits discrimination based on race, color, religion, creed, national origin or ancestry, ethnicity, sex (including pregnancy, childbirth or related conditions), gender identity and expression, age, disability, citizenship, sexual orientation, military service, genetic information, and any other characteristic protected by law. Come join us - you will love it!Ībout The Role: Who has access to what? You'll answer this question and many more as you work on automating the overall Identity and Access Management and Review process through your skills in Active Directory, scripting, directory lookups, application permission tables, and database queries.This Is What You'll Do: You will develop and implement the core processes and procedures for an organizational Identity Management function. View We have great people here and are looking for more.
0 Comments
Leave a Reply. |