Company

Micro-Data Systems Inc.See more

addressAddressEdgewater, NJ
type Form of workFull-Time
CategoryEngineering/Architecture/scientific

Job description

Job Description

Description:
The Identity and Access Management (IAM) Security Engineer's role is a technical position which will support the development of security strategies and architecture vision as it relates to our client platforms, specifically strong experience with Azure cloud IAM.
In this role, you will work with other architects and service owners to provide a consensus-based enterprise solution that is scalable, adaptable and synchronized with the ever-changing business needs for Business to Enterprise, Business to Business, and Business to Consumer Identity Solutions using Azure Cloud.
Key Responsibilities will include to:

  • Act as Subject-matter expertise across IAM configuration relating to Azure Expertise and On-Prem AD.
  • Participate in Identity and Access Management enterprise governance processes and drive IAM standards adoption.
  • Have a solid understanding of Conditional Access Policies
  • Experience building B2C and B2B tenant and identity model.
  • Have expertise in Hybrid Cloud Environments.

Experience and Skills:

  • Experience interpreting identity and Access Management strategies and direction. Further, the person must have experience bringing together key tenets of Information Security to the IAM cloud strategies and developing technical security solutions that properly align.
  • 3+ years technical support, Azure technical consulting experience, or information technology experience
  • Technical experience and knowledge working in Azure technical support or equivalent technology.
  • Technical skills and hands on experience in the following areas: Active Directory, ADFS, SSO configuration, Azure Identity protection, Identity Management, O365 Identity, Azure MFA.
  • Experience engineering IAM solutions within Microsoft Azure.
  • Intimate familiarity with IAM related protocols such as SAML, SCIM, OpenID and OAuth.
  • Azure Application Portfolio Creation and Migration.
  • Experience with Federation concepts and technologies particularly with solutions from ADFS and Ping Identity.
  • In-depth experience with Microsoft Azure, particularly Azure AD and Application Portfolio designs connecting Azure to enterprise infrastructure.
  • Coding and code reading skills in Python, R, SQL, Powershell, GoLang, Javascript
  • Ability to analyze and adapt code
  • Ability to implement a build strategy
  • Deep knowledge of DevOps and its tools
  • Experience with continuous integration
  • Deep knowledge of Microsoft Azure, from common features to data security solutions
  • The ability to transfer and deploy the necessary components of the Azure IAM services
  • Ability to work with scenarios, cloud architectures, and concepts
  • Excellent communication (oral / written) skills required.
Refer code: 8703963. Micro-Data Systems Inc. - The previous day - 2024-03-24 00:55

Micro-Data Systems Inc.

Edgewater, NJ
Popular Identity Access Management Engineer jobs in top cities
Jobs feed

Chief Financial Officer

Springstone, Inc.

Carrollton, TX

$154K - $196K a year

Room Attendant Part-Time/Weekends

Sage Hospitality Resources L.l.c.

Denver, CO

Senior Fermentation Scientist, Process R&D

Iff Family Of Companies

Madison, WI

F117 Finance Program Manager (Hybrid)

Raytheon Technologies

Oklahoma City, OK

Shift Supervisor

Red Robin International

Austin, TX

Delivery Service Manager / Dispatch Coordinator

Abc Supply

Bergenfield, NJ

System Protection Engineer - Relay Engineer

Portland General Electric Company

Tualatin, OR

Electrician

College Of Southern Maryland

La Plata, MD

Site and Field Communications Consultant

Corteva

Indianapolis, IN

Director, Software Engineering

The Coca-Cola Company

Austin, TX

Share jobs with friends

Identity & Access Management (IAM) Engineer

Lord Abbett.com

Jersey City, NJ

4 months ago - seen

Identity & Access Management Engineer

Horizon Blue Cross Blue Shield of New Jersey

Newark, NJ

5 months ago - seen