IAM Consultant

Overview

Hybrid
$70 - $90
Contract - W2
Contract - 12 Month(s)

Skills

IAM Or identity Access Management Consultant or Engineer
Automation
Bash or Python
Linux
windows
Preferred -NIST
CSF
CJIS
IRS 1075
CMS MARS-E

Job Details

Position : IAM Consultant

Location : Columbia,SC

Client : State of SC

Position id : 8862

Required Skills

Skill Type
Skill Name
5+ years of experience and expert understanding of identity and access control, logging and reporting systems
5+ years of experience and expertise in automation development using tools such as python and bash
5+ years of experience with Linux, windows, network security protocols and procedures
5+ years of experience in supporting large IT environments and/or system deployments

Preferred Skills

Skill Type
Skill Name
Knowledge of SIEM analysis and reporting
Knowledge of Security Frameworks including: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
Knowledge of application security (APPSEC)
Attachment:
Statement of Work (SOW) for Contingent Labor Request

Primary Work Location: 4430 BROAD RIVER RD, COLUMBIA, SC 29210

# of Openings : 1

Company / Department culture (why do you enjoy working for the company selling points for potential candidates): DEPARTMENT OF ADMINISTRATION - DIVISION OF INFORMATION SECURITY (Client)

Why is this position open ( new role, increased workload, new dept, resignation, promotion)?
If backfill Position What separated the candidate, you initially selected from all the other resumes presented?
New role supporting Identity and access management and security automation.

What types of staffing challenges or headaches have you experienced in the past?

  • Candidates that have the required skillset
  • Proven experience with similar efforts and environments

Scope of the project: THE POSITION WILL WORK AS A SECURITY IDENTITY AND ACCESS MANAGEMENT ENGINEER WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITY ARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER. This POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION.

Position Title: Security architect consultant

Pre-employment Checks (drug, credit, criminal, motor vehicle)?
DRUG, DRIVING, CREDIT, CRIMINAL, E-VERIFY, SLED

Daily Duties / Responsibilities:
PREFERENCE WILL BE GIVEN TO A CANDIDATE WHO CAN WORK ONSITE OVER HYBRID OVER FULL-TIME REMOTE (ON-SITE AS NEEDED).

  • IDENTITY AND ACCESS MANAGEMENT ENSURING THAT APPROPRIATE IDENTITY MANAGEMENT, SINGLE SIGN ON, MULTI-FACTOR AUTHENTICATION, ACTIVE DIRECTORY AND APPLICATIONS ARE PROPERLY IMPLEMENTED AND CONFIGURED TO SUPPORT IT AND SECURITY OPERATIONS
  • RESPONSIBLE FOR AUTOMATION DEVELOPMENT AND IMPLEMENTATION OF DISPARATE SECURITY AND ENTERPRISE IT TOOLS
  • Responsible for planning, designing, development and implementation of enterprise security solutions that align with business goals and risk tolerance.
  • Design, deploy and manage countermeasures to known security threats and develop preventative mitigation strategies for new and emergent threats to enterprise data, networks and associated services.
  • Ensure, validate and measure the consistent application of protective measures throughout the enterprise business application and infrastructure support environments. Take appropriate action to protect state data and technology services.

Required Skills (rank in order of Importance):

  • FIVE YEARS OF EXPERIENCE AND EXPERT UNDERSTANDING OF IDENTITY AND ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
  • FIVE YEARS OF EXPERIENCE AND EXPERTISE IN AUTOMATION DEVELOPMENT USING TOOLS SUCH AS PYTHON AND BASH
  • CYBER SECURITY AWARENESS AND UNDERSTANDING
  • FIVE YEARS OF EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
  • FIVE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS

Preferred Skills (rank in order of Importance):

  • SIEM ANALYSIS AND REPORTING
  • SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS-E
  • APPLICATION SECURITY (APPSEC)

Required Education/Certifications:
BACHELOR'S DEGREE IN AN
INFORMATION TECHNOLOGY OR
INFORMATION SECURITY RELATED
FIELD
EIGHT YEARS OF RELEVANT WORK
EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION

Preferred Education/Certifications:

  • CISSP, CISA, CISO OR EQUIVALENT ADVANCED SECURITY CERTIFICATION.
  • ADDITIONAL RELEVANT CERTIFICATIONS (E.G., CEH, OSCP, GPEN).
  • VENDOR CERTIFICATIONS IN SIEM OR LOGGING TECHNOLOGIES.

Interview Process (phone, video or in-person, how many rounds of i/v's, etc)?

INITIAL ROUND OF INTERVIEWS ON MICROSOFT TEAMS (ON CAMERA) WITH IN-PERSON INTERVIEWS
PREFERRED BEFORE FINAL SELECTION

Interview Availability : How soon can you schedule an interview (date / times)?

ASAP after posting closes and resumes are received and reviewed

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Abacus Service Corporation