Identity & Access Management / IAM Engineer, CyberArk

Overview

On Site
75 - 100 /hour
Contract - W2
Contract - years C2H
No Travel Required

Skills

Cybersecurity
PAM
IAM
privileged access management (PAM) integrations
CyberArk Conjur
Sailpoint
Secret Server
ASG Remote Desk
Devolutions
SCIM
infrastructure
networks

Job Details

We have been retained by our client in the NW Houston area to deliver a IAM Engineer on a long-term contract or contract to hire basis. This is onsite work with onsite teams and onsite team collaboration in northwest Houston. This is an excellent company and culture.



Contract runs 1-2 years. Use Identity & Access Management (IAM), Sailpoint, CyberArk Conjur, identity governance and administration (IGA), privileged user access management and security controls in a zero trust environment. Protect all resources & data resources, and ensure only the right people can access them. Use IGA to clearly understand what access each individual should have inside the organization. Onboard the privileged access users accounts using the VAULT for Credentialling and established procedures. Solve privileged access user account architecture problems, including the VAULT for Credentialling. Integrate apps thru REST ful API s. Perform routine maintenance. Some on-call for ad-hoc or after-hours problem solving, or patching. Document architecture and processes.



Integrate SailPoint with CyberArk Privilege Cloud Shared Services. After you integrate the best-in-class CyberArk Conjur (the Conjur Cloud), with SailPoint, that integrated solution will give you and your security team a single, automated and policy-based process for all users to effectively manage access requests, approvals, certifications, provisioning and remediation of excessive access rights. SailPoint IdentityNow and the Privileged Account Management source for CyberArk Privilege Cloud Shared Services provides a capability of deep governance for Accounts and Groups (Safes) using IGA.



Use your skills in cybersecurity, infrastructure, networks, system architecture, to provide the best possible solutions for privileged access management. Use your skills to create a privileged access management system that will use system cross domain identity management (SCIM). Use the SCIM Protocol at the application-level, using REST protocol for provisioning and managing identity data, and support privileged access management system integrations. You will need a solid technical understanding of privileged access management components such as credential vault, credential rotations, and mechanisms to discover privileged identities.



Use remote connection manager products such as Devolutions Remote Desktop Manager or the product recently bought by Rocket Software, ASG s Remote Desktop Manager to set up and enables administrative access to remote computers. Use ASG Remote Desktop and/or Devolutions features to integrate connection protocols, manage Windows, Citrix, Linux/UNIX and Macintosh systems efficiently.





Desired Skills:

CyberArk, CyberArk Conjur, Sailpoint IIQ, etc.

PowerShell and scripting

ASG Remote Desktop Manager

Devolutions Remote Desktop Manager

A Secret Server, Privileged Account Management (PAM)



Desired security certifications:

CISSP, CIAM, Secret Server Engineer, CyberArk Defender, Sailpoint Identity IQ



Desired memberships/associations:

ISSA, ISACA, Certified Information Security Manager, CISM, InfraGard



Here is a synopsis of what this team is looking for: an experienced Information Security professional in identity management, access management, role management, compliance management, solution design, system integration, implementing and deploying large-scale identity management solutions for large enterprises using SailPoint, CA IAM, MIM and other IAM tools. Information Technology and Security professional in architecting and deploying Identity Management, LDAP Directories, Single/Reduced Sign-On (SSO), Provisioning and Provisioning/ Identity Workflows, Access Management, RBAC (Role-Based Access Control), Compliance and Auditing Technologies, Federated Identity/Federation, Enterprise System Architecture, Security Infrastructure Design, Authentication and Authorization technologies, as well as custom-built security and technology frameworks. 1-2 year renewable contract. Contract to hire is an option being considered.



Employment Type: Contract or Contract to Hire





Hourly Rate: $75.00 100.00 per hour (w-2 employment)







Location: Houston, Texas - NW Houston





Immigration: s and those authorized to work in the US are encouraged to apply. We are unable to sponsor H1b candidates at this time.



No third parties. No consulting firms. Principals only. No C2C. Candidates only.







Please apply with resume



NW Houston onsite contract opp t y: IAM Engineer, CyberArk









Any candidate is encouraged to apply, call or to send a text to: