Microsoft Identity Management Consultant FIM

Illinois  ‐ Onsite
This project has been archived and is not accepting more applications.
Browse open projects on our job board.

Keywords

Description

*This is a 6+ month contract role, and we are unable to use any 3rd party consultants*

Prestigious Financial Investment Firm is currently seeking a Microsoft Identity Management Consultant with Forefront (FIM) experience. Candidate will be responsible for engineering Identity & Access Management (lAM) solutions. Works with lAM architects, application developers and vendors to build, configure, test and implement lAM solution that meet the business needs of the enterprise and are aligned and consistent with enterprise IT strategies and plans. Engineers lAM solutions, working closely with lAM architects, vendors and business managers to interpret and apply business requirements and lAM designs to lAM solution development. Engineer's solutions to ensure that lAM services perform according to defined processes, meet defined policies and comply with applicable information security requirements. Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization. Leads activities to troubleshoot and resolve complex authentication, authorization and integration problems. Performs and/or leads lAM technical support, including but not limited to monitoring and res pending to server events, ensuring data replication, gathering lAM statistics, and performing general maintenance

QUALIFICATIONS:

  • Knowledge and experience in the capabilities and use of the technologies in scope.
  • Understanding of cloud computing services, architecture and security concerns.
  • At least 3 - 5 years' experience in supporting and maintaining technologies in scope
  • Demonstrated effective decision making in regards to resolving risk and vulnerabilities in the environment.
  • Some experience in managing major vendor relationships in this technology area.
  • At least one-year experience in providing consulting to senior management on the use and selection of these technologies.
  • At least 1 to 2 year experience in demonstrating skills in developing a technology plan including technical strategy and direction as well as the related business case for the use of that technology
  • Strong background and understanding of the technical direction in this space and the prevailing standards
  • A proven history of being able to influence business and IT peers and management in the decision making process.
  • Ability to explain complex technical detail and tradeoffs to non-technical associates
  • Technical Vendor management and negotiating skills.
  • Excellent communication skills including the ability to present complex presentations to large audiences.
  • Crucial conversations as demonstrated by the ability to facilitate and conduct crucial conversations when stakes   are high, emotions are strong and opinions vary that result in win/win solutions and while doing so fostering communication by encouraging open, honest two-way communication
  • Bachelor's degree in related   field required, Master's degree preferred
  • Industry certifications: CISSP
  • Familiarity with lAM solutions including Cyber Ark Privileged Identity Management Suit
  • Strong background with Client Server configurations, network protocols and software
  • Experience developing policies, procedures, and technical training materials
  • Experience with Internet technologies and security issues
  • Knowledge and understanding of security technologies including intrusion detection/prevention systems, Firewalls, vulnerability scanning, and data protection/encryption systems
  • Experience with vulnerability assessments, risk analysis and compliance testing
  • Broad knowledge of full range of distributed, data & security hardware and software patterns, design standards and options.
  • Possesses strong knowledge of vendor community for full range of security architectures including but not limited to data & security technologies.

TECHNOLOGIES:

  • Experience with security architecture, design, operational support & troubleshooting Microsoft Active Directory, DNS, WINS and DHCP, IP Addressing, LDAP authentication, Checkpoint Firewalls, IDP, IPS, Proxy, content filtering, s pam filtering and encryption security technologies, 802.x Wi-Fi, wireless, Internet hosting, secure remote access technologies.
  • Knowledge in securing data, voice, video, Internet/Intranet, E-commerce and telecommunication network architectures (Cisco, Avaya, Microsoft, Juniper, IPC Turret)
  • Must have experience in securing transport protocol architecture, design, operations support & troubleshooting skills in regards to (TCP/IP, IPsec, NAT, SNMP, SMTP, HTTP, HTTPS, 802.x, MPLS, VPN, TOM private line, ISDN)

RESPONSIBILITIES:

  • Interpret and apply lAM architecture and designs to build Identity and Access Management (lAM) solutions to support dispersed businesses, personnel and customers
  • Work with business unit (BU) and corporate function   (CF) managers to understand business requirements, enterprise IT standards and other considerations that influence how lAM solutions and services should perform and operate
  • Engineer solutions to ensure that identity and access management solutions and services perform according to defined processes, meet defined policies and comply with information security requirements
  • Engineer technical lAM solutions, engaging during the life cycle of solutions delivery, service owners, architects, project managers, global infrastructure teams, regional IT teams and key lAM product vendors
  • Integrates lAM systems with in-house and third party applications for provisioning, identity authentication and systems resources authorization, developing connectors between lAM tools and systems resource
  • Work with application developers and IT operations to develop, test, roll out and maintain enterprise-wide lAM solutions and services
  • Lead quality control and quality assurance activities, such as developing and executing test plans I scripts and resolving deviations or exceptions, for newly developed and/or enhanced lAM solution
  • Participate in defining architecture and process standards for the identity management platform: contribute to ongoing evolution and development lAM strategies, roadmaps and plans
  • Work with the broader IT security, risk and compliance teams to interpret policies and standards, ensuring policies and standards are properly followed by new and existing lAM solutions
  • Contribute to evaluation, selection and configuration of lAM products and Services from vendors
  • Troubleshoot and resolve complex authentication, authorization and integration problems
  • Identify opportunities and outline   action plans to improve how existing lA solutions are implement
  • Lead and/or execute of daily, weekly and monthly support activities to maintain the overall global lAM environment, in coordination with IT operations and regional IT teams Develop dashboards, metrics and benchmarks for the technology
  • Ensure currency of the technology
  • Develop Cradle to grave governance processes around the technology
  • Develop technology overviews and roadmaps in conjunction with technology vendors
  • Create and maintain the documentation & designs
  • Develop and document the service architecture
Start date
n.a
Duration
6months +
(extension possible)
From
Request Technology-Craig Johnson
Published at
31.12.2014
Project ID:
828404
Contract type
Freelance
To apply to this project you must log in.
Register