IAM/Sailpoint Information Security Engineering Consultant
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This Role
Experience working in IAM, security reviewing/security assessing applications IAM needs; ability to understand a solution quickly and identify key threats/and risks, and how to fix.
Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures.
What Part Will You Play?
Assist the IAM team in implementing and supporting IBM ISIM (IBM Security Identity Manager), ISAM (IBM Security Access Manager), IBM SDI/TDI (Tivoli Directory Integrator), SailPoint IIQ, CyberArk and other IAM solutions. Work with vendors, implementation partners, internal teams and architects on IAM solutions.
Experience with configuring multiple modules of ISAM like AAC, Security Token Service, policy administrator, federation, runtime component.
Work on installation, upgrade and configuration of ISAM, supporting LDAP and Database configuring authentication policy and managing SSO.
Experienced in implementing SSO, Identity Federation, OpenID Connect, OAuth 2.0, SAML 2.0 with Azure AD.
Implement API security and Web access management, Web authentication practices, SSL/TLS with federation tools like Ping or Okta.
Implement Advance Access Control mechanisms such as Multi-Factor Authentication, Role-Based Access Control and Context-based Access control using PingFederate, ADFS and Azure AD.
AWS Experience, CI/CD/GitOps experience, and IAM architecture or engineering experience. Some experience working in an Infrastructure as Code environment, and a willingness to help define security standards for use by multiple teams.
Work with other internal teams to identify their IAM requirements.
Work with IAM and other teams to help architect IAM solutions that are secure, compliant, automated, and scalable.
Provides expertise and advice as a Subject Matter Expert (SME) for Identity Governance and administration (IGA), Privilege Access Management (PAM) and troubleshooting of all Identity and Access Management (IAM) tools, applications and assigned technologies. This ensures appropriate access and meets internal/external data security requirements.
Reviews maintenance reports and violation logs to detect and employ solutions that deter existing and future unauthorized access that may be a threat to corporate, client, and team member security; designs controls to mitigate future threats.
Uses a comprehensive understanding of multiple IAM, operational and security technologies, to lead the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.
Creates, maintains, reviews new relevant documentation to include, but not limited to, Standard Operating Procedures, project change control methodologies, and architectural diagrams. Provides adequate support and processes for maintaining the confidentiality, integrity and availability of critical security systems.
Good Understanding of network Topologies
Working with multiple Operating systems like AIX , RHEL and Windows.
Working experience with Federation tools like PING Federation and WindowsADFS
What Are We Looking For in This Role?
Relevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experience
Typically Minimum 8+ Years Relevant Exp
5+ years IAM architect
Responsible for the implementation, security, maintenance and access administration of information security managed technologies
Must have the ability to pass and maintain a government level security clearance
Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
Typically Minimum 4 Years Relevant Exp
Experience supporting UNIX, Windows Server, mainframe and/or HP NonStop systems. Experience with remote administration tools, basic networking concepts, Help Desk support, scripting/programming and/or logical access administration using security products (ACF2, Active Directory, LDAP, etc.).
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred
What Are Our Desired Skills and Capabilities?
Skills / Knowledge - Having broad expertise or unique knowledge, uses skills to contribute to development of company objectives and principles and to achieve goals in creative and effective ways. Barriers to entry such as technical committee review may exist at this level.
Job Complexity - Works on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Creates formal networks involving coordination among groups.
Supervision - Acts independently to determine methods and procedures on new or special assignments. May supervise the activities of others.
Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problems
Applications and Systems - Utilizes, configures and monitors security using Identity and Access Management technologies to meet internal and external requirements for data security
Global Payments Inc. is an equal opportunity employer.
Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. Those applicants requiring reasonable accommodation to the application and/or interview process should notify a representative of the Human Resources Department.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory APIs AWS Azure CI/CD CISM CISSP Clearance Computer Science Cyberark GIAC Governance GSEC IAM LDAP Mainframe Okta OpenID SailPoint SAML Scripting Security Clearance SSO TLS UNIX Windows
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Analyst jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Information Security Officer jobs
- Open Security Operations Engineer jobs
- Open Analyste CERT / Incident Responder junior (H/F) jobs
- Open Ingénieur DevSecops H/F jobs
- Open Staff Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Analyste CERT / Incident Responder senior (H/F) jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Security Analyst jobs
- Open o365 Security Architect jobs
- Open Principal Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Staff Product Security Engineer jobs
- Open Electronic Warfare Advanced Tactical Trainer jobs
- Open Security Researcher jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open SOC-related jobs
- Open GCP-related jobs
- Open Risk assessment-related jobs
- Open Governance-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Analytics-related jobs
- Open CISM-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open Vulnerability management-related jobs
- Open Java-related jobs
- Open CISA-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Forensics-related jobs
- Open APIs-related jobs
- Open DoD-related jobs
- Open EDR-related jobs
- Open Splunk-related jobs