Overview
Skills
Job Details
S2S Soft is a Global IT Solutions and Services company with unmatched expertise spread across various Industrial Internet like IT Staff, Document Management, Software Development, Mechanical Design and Independent Software Vendors. Our clients have relied on us for providing Technology initiatives and support for their business processes in the areas of Enterprise Application Management, Custom Application Management, Business Intelligence & EAI, Infrastructure Management & Security and Quality Assurance & Testing Services.
S2S Soft understands the unique challenges faced by various industries. Through hands on experience earned from different client engagements, we enable our customers to address their challenges with tailor made solutions best suited to their present systems. With a firm eye on Return on Investments of our customer, we conceive, build and deploy solutions that are robust, scalable and yet flexible. We partner with our clients on their long-term initiatives by providing real value while demonstrating high level of professionalism and ethics metus.
Hi,
Hope you are doing Good!!
This is Mohana from S2SSoft LLC , we are looking for the below mentioned job description. Kindly forward me your resume, Rate, and contact details for further process.
Role: IAM / PAM with UNIX & LINUX- Red Hat
Location: San Antonio, TX Onsite
Contract
Job Description: IAM / PAM with UNIX & LINUX-Red Hat
UNIX & Windows Security team:
- Ensure appropriate CRs exist for required updates to respective platform and environments
- Provide access to Users and Service Accounts that are requested by customers by verifying security related concerns and the level of access needed
- Create platform-based accounts and manage passwords for the automation of application jobs on DEV, TEST and PRODUCTION environments on assigned platform
- Verify User/Service accounts that need elevated and/or privileged access are approved via Information Security standards
- Ensure standard naming conventions as defined via security policies
- Gather sensitive information such as Owner/SME info for TPM Applications for the approval of customer submitted individual requests
- Use the SAC/SAU tools to create Service accounts with a unique ID and password ensuring only authorized personnel are able to use the account for job/processes
- Create/modify/manage groups for the respective applications which are responsible for daily tasks on respective environments
- Troubleshoot failed jobs with respect to security concerns such as password expiration, lack of access, or lack of group privileges
- Update status of requests/incidents via approved workflow
- Prioritize customer requests depending on business justification and expediting the process by coordinating with various teams
- Collaborate with Business technical teams for issue resolution and mitigation
- Utilize/modify automated internally generated scripts which enable running multiple servers all at once through Enterprise Batch processes
- Respond to requests within team defined Service Level Objectives (SLO)
- Participate in assigned Platform Security activities to include timely and effective reporting, tracking, follow-up, and communication of problems with the user community
- Document actions taken for audit and legal purposes within approved event tracking system
- Implement share and file permissions ensuring principle of least privilege is adhered to
- Implement new accesses through PSM solution for TPM application owners
- Implement new Managed and Unmanaged service accounts in assigned platform
- Troubleshoot access issues with service accounts
- Troubleshoot issues with CyberArk implementation of managed service accounts
- Manage group membership for different types of accounts based on security and access standards