IAM / PAM with UNIX & LINUX- Red Hat

  • San Antonio, TX
  • Posted 19 hours ago | Updated 2 hours ago

Overview

On Site
Accepts corp to corp applications
Contract - Independent
Contract - W2
Contract - 6 Month(s)

Skills

Linux
unix
Red Hat
IAM / PAM

Job Details

S2S Soft is a Global IT Solutions and Services company with unmatched expertise spread across various Industrial Internet like IT Staff, Document Management, Software Development, Mechanical Design and Independent Software Vendors. Our clients have relied on us for providing Technology initiatives and support for their business processes in the areas of Enterprise Application Management, Custom Application Management, Business Intelligence & EAI, Infrastructure Management & Security and Quality Assurance & Testing Services.

S2S Soft understands the unique challenges faced by various industries. Through hands on experience earned from different client engagements, we enable our customers to address their challenges with tailor made solutions best suited to their present systems. With a firm eye on Return on Investments of our customer, we conceive, build and deploy solutions that are robust, scalable and yet flexible. We partner with our clients on their long-term initiatives by providing real value while demonstrating high level of professionalism and ethics metus.


Hi,

Hope you are doing Good!!

This is Mohana from S2SSoft LLC , we are looking for the below mentioned job description. Kindly forward me your resume, Rate, and contact details for further process.

Role: IAM / PAM with UNIX & LINUX- Red Hat

Location: San Antonio, TX Onsite

Contract

Job Description: IAM / PAM with UNIX & LINUX-Red Hat

UNIX & Windows Security team:

  • Ensure appropriate CRs exist for required updates to respective platform and environments
  • Provide access to Users and Service Accounts that are requested by customers by verifying security related concerns and the level of access needed
  • Create platform-based accounts and manage passwords for the automation of application jobs on DEV, TEST and PRODUCTION environments on assigned platform
  • Verify User/Service accounts that need elevated and/or privileged access are approved via Information Security standards
  • Ensure standard naming conventions as defined via security policies
  • Gather sensitive information such as Owner/SME info for TPM Applications for the approval of customer submitted individual requests
  • Use the SAC/SAU tools to create Service accounts with a unique ID and password ensuring only authorized personnel are able to use the account for job/processes
  • Create/modify/manage groups for the respective applications which are responsible for daily tasks on respective environments
  • Troubleshoot failed jobs with respect to security concerns such as password expiration, lack of access, or lack of group privileges
  • Update status of requests/incidents via approved workflow
  • Prioritize customer requests depending on business justification and expediting the process by coordinating with various teams
  • Collaborate with Business technical teams for issue resolution and mitigation
  • Utilize/modify automated internally generated scripts which enable running multiple servers all at once through Enterprise Batch processes
  • Respond to requests within team defined Service Level Objectives (SLO)
  • Participate in assigned Platform Security activities to include timely and effective reporting, tracking, follow-up, and communication of problems with the user community
  • Document actions taken for audit and legal purposes within approved event tracking system
  • Implement share and file permissions ensuring principle of least privilege is adhered to
  • Implement new accesses through PSM solution for TPM application owners
  • Implement new Managed and Unmanaged service accounts in assigned platform
  • Troubleshoot access issues with service accounts
  • Troubleshoot issues with CyberArk implementation of managed service accounts
  • Manage group membership for different types of accounts based on security and access standards
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.