Technology Consultant - Cyber Security - Identity & Access Management (IAM) (Manager) at Ernst & Young in Falls Church, VAother related Employment listings - Falls Church, VA at Geebo

Technology Consultant - Cyber Security - Identity & Access Management (IAM) (Manager) at Ernst & Young in Falls Church, VA

Assist client organizations in aligning security management strategy with business goals by managing access to resources and services and enforcing business, privacy, and security policies. Assist clients in managing and executing access transformation programs and determine the role of such systems within the clients' organizations. Provide service planning and transition, service designing, Business-As-Usual (BAU) support, Digital Identity-as-a-Service (DIaaS) platform support and continuous service improvement of Identity & Access Management (IAM) solutions and services. Assess and deliver foundational components including IAM program management assistance, security delivery model and strategy planning, industry standard service delivery framework, operating model and governance, Service Design and steady state operations, and progress design and re-engineering. Also assess and deliver innovative solutions concerning cloud and mobile apps access management, access enforcement/administration implementation, access/elevated administration implementation, and SOD management and other IAM compliance related activities. Monitor and manage an IAM ecosystem for security breaches. Research the latest IAM trends to determine whether their installation can increase the clients' efficiency and effectiveness. Develop security standards and best practices for their organization and devise ways to add new functionality to existing IT systems. Recommend IAM security enhancements to client management or senior IT staff. Manage and motivate teams with diverse skills and backgrounds. Consistently deliver quality client services by monitoring progress. Demonstrate in-depth technical capabilities and professional knowledge. Maintain long-term client relationships and networks. Cultivate business development opportunities. Full time employment, Monday - Friday, 40 hours per week, 8:
30 am - 5:
30 pm. MINIMUM REQUIREMENTS:
Must have a Bachelor's degree in Computer Science, Information Systems, Engineering, or a related field and 5 years of progressive, post-baccalaureate consulting experience in Cyber Security or IAM. Alternatively, will accept a Master's degree in Computer Science, Information Systems, Engineering, or a related field and 4 years of consulting experience in Cyber Security or IAM. Must have 2 years of experience in one or more of the following:
- Saviynt, SailPoint IIQ, IBM Security Identity Manager, RSA Identity Manager, CA Identity Governance, Oracle Identity Manager, or other user identity lifecycle management solution products or role-based access control solutions; - Radiant Logic, Virtual Directory, or other directory services products; - Azure AD, ForgeRock, Ping Identity, Siteminder, OKTA, or other single sign-on, multi-factor and federation solutions; - BeyondTrust, CyberArk, Centrify, or other privilege accounts lifecycle management solutions. Must have 2 years of experience in access control concepts, including access administration, directory services, SAML, LDAP, or PKI. Must have 1 year of experience in defining and re-engineering processes, including incident management, change management, and configuration management database. Must have 2 years of experience managing teams of Cyber Security advisory/consulting professionals. Requires travel up to 80% to serve client needs. Employer will accept any suitable combination of education, training or experience.
Salary Range:
$200K -- $250K
Minimum Qualification
IT Consulting, IT Security, Technology ManagementEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.