GC / U.S. Citizens and those authorized to work in the U.S. are encouraged to apply.
• ABAC role administration and integration with an entitlements administration solution that needs to provision fine-grained entitlements to legacy apps. - Data driven UI architecture so that adding new products for entitling only requires adding the Meta data. - Interface solutions for managing changes to upstream reference data that needs to be consumed by the entitlements administration engine and applied to affected entitlements. - Implementing an externalized PIP/PDP/PEP solution set for both legacy and Greenfield applications • - Preferred ABAC implementation experience using Axiomatic tool • ABAC - Attribute based access control. ABAC is a "next generation" authorization model that provides dynamic, context-aware and risk-intelligent access control • Should be able to help in setting up data security, compliance to standards, policies, and procedures for enterprise · Must have experience in security implementation using SSO, ADFS, LDAP and authentication and authorization · Must have hand-on in MS.NET based solution using C#, Web API and MVC · Good in reviewing deliverables for correctness and completeness · Must has hands on to create POC for confirm design and architect to team · Able to do decision analysis for security tools selection · Good in mentoring multiple teams, help team in design solution and ensure realization · Exposure in capturing security requirements by understanding business strategies and requirements, · Should be able to perform research on latest security standards, perform security assessment on data, application and infrastructure · Should be able to do risk assessments, validate application architecture / platform from security standpoint · Should be able to help application team in resolving issues related to security and data integration · Should be able to do scientific estimates and WBS · Verifies security systems by developing and implementing test scripts · Maintains security by monitoring and ensuring Prepares system security reports by collecting, analyzing, and summarizing data and trends. Preferred Qualifications • Security-related certification: CISSP, GSEC, CISM, or similar • Proven ability to drive growth and operational excellence through IT capabilities • Strong leadership and communication skills necessary to engage with stake-holders, governance, and cross functional teams. • Good communication and documentation skills