Access Management and Access Governance | Scrabble & Jigsaw
Posted on October 3, 2024
Job Description
<ul>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">6-8 years of relevant experience</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Exceptional interpersonal skills with ability to communicate with senior leaders and technology teams alike. </span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Ability to work independently and adapt to changing business priorities.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Detail oriented individual, with a keen eye towards details.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Meticulous IAM skills</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Superior knowledge in the fields of Identity Governance and Identity Lifecycle management</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Background in End User Accounts Management, Identity Access Management, and Privileged Access Management is mandatory. Background in Information Security is preferred.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Must possess basic working knowledge of core technology and networking technology stacks, which may include but is not limited to;</span></span></span></span>
<ul style="list-style-type:circle">
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Legacy and Modern IdPs such as Active Directory, LDAP, Entra ID, OKTA</span></span></span></span></li>
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Cloud Computing</span></span></span></span></li>
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Remote Access Systems</span></span></span></span></li>
<li style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span style="font-size:10.0pt">Database Servers</span></span></span></span></li>
</ul>
</li>
</ul>