PLM Engineer

  • Shelton, CT
  • Posted 3 days ago | Updated 3 days ago

Overview

On Site
Depends on Experience
Accepts corp to corp applications
Contract - W2
Contract - 04 Month(s)
100% Travel

Skills

PLM
IAM
POWERSHELL
Azure directory
Microsoft exchange
information security

Job Details

Role Name: PLM Engineer Location: 1 Corporate Dr, Shelton, CT 06484 Duration: 04 Months Work Shift: 8 AM - 5PM EST
JOB DESCRIPTION:
The Sr. PLM Engineer will be responsible for the analysis, implementation, maintenance, and assist with design of all layers of IAM applications, which includes Authorization/Authentication/Accounting, Identity and Account Creation/Management/Provisioning.
This role will also handle Role-based Access Control (RBAC) configuration and management, Single Sign On implementation, Process Improvement, Process Automation, IAM Break/Fix and IAM Enhancements.
The IAM Engineer will work with other members of team, and manager, to ensure compliance with Franchise World HQ standards for security, privacy, and accessibility as defined by the Information Security Team.
In addition, engineer will lead and direct the implementation of a new IDP tool in Subway s environment, OKTA.
Essential Duties:
Project Work:
- This includes the setup of new configurations and baselines around IAM within the IDP. This includes conditional access policies, RBAC, new SCIM setup, new governance
- Initial set up and configuration of a new IDP solution (OKTA) with an ability to perform architecture diagraming that will be used as the benchmark for future efforts. Utilize best practice frameworks and maturity models to set the future growth of the program as a whole
- Manage technology projects and system activities
Operations:
- Aligns with Industry best practices and establishes Subway policies and procedures accordingly
- Design and implement sustainable solutions to be used for authentication, authorization, user life-cycle management, role-based access control, privileged account management (PAM), audit, and monitoring.
- Develop and oversee the implementation of Information Security Procedures and Policies relative to Identify
- Design and implement appropriate security controls to identify vulnerabilities and risks for access to systems and applications
- New SSO setup, IAM incident resolution and root cause analysis, complex onboarding/offboarding, upgrades/patching, change tickets, MFA management, group and access cleanup, audits, HR downstream changes, tool management, etc
- Conduct investigations and audits of identity gaps and vulnerabilities and evaluate the implications
- Collect business and functional requirements in Identity and Access Management area
- Establishes IDM and Directory related standards
- Reviewing service/application logs
- Partner closely with Information Security
- Experience with ticketing tools such as ServiceNow
- Participate in team on-call rotation for production support
Continuous Improvement:
- This involves modernization and optimization of the IAM program as a whole to a higher-level maturity. Improving upon SCIM, further automation of workflows, introducing new industry standard functions (such as passwordless authentication), improve identity lifecycle, conditional access policies, RBAC flows, etc.
- Manage and improve policies to improve our risk framework while performing vulnerability remediation to guide the improvement initiatives
- Assess the quality of controls and use performance indicators to create an action plan to fill gaps
Skills & Experience:
- Bachelor s Degree Preferred Computer Science, Information Technology, Information Security. Cyber Security - OR- Related Experience Preferred
- 8+ years experience in information security, infrastructure
- 5+ years experience in IAM, PAM, ZTNA and security governance
- 5+ years experience in PowerShell scripting
- 5+ years experience in Active Directory/Azure Active Directory
- 5+ years experience in Microsoft Exchange
- 3+ years experience as an OKTA Certified Administrator
- 3+ years experience in setting up and/or managing APIs
- Strong understanding of PKI, encryption, certificate management, tokenization
- Experience setting up/managing SCIM, RBAC, SSO, MFA to the IDP
- Experience in Azure Active Directory and Active Directory, OKTA or similar IDPs required (Saviynt, etc.)
- Database and API data parsing with PowerShell experience
- Experience with cloud computing services such as AWS and Azure for the purpose of SCIM and managing access a plus
- Querying languages such as SQL against tools such as Splunk or Dynatrace. Rapid7 desirable
- GPO creation best practices
- Authentication Server Software
- Experience with risk management data and analysis
- Strong problem-solving and communication skills

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.