HumanBit Logo

Access Management and Access Governance | Scrabble & Jigsaw

Posted on October 3, 2024

Job Description

<ul> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">6-8 years of relevant experience</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Exceptional interpersonal skills with ability to communicate with senior leaders and technology teams alike. </span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Ability to work independently and adapt to changing business priorities.</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Detail oriented individual, with a keen eye towards details.</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Meticulous IAM skills</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Superior knowledge in the fields of Identity Governance and Identity Lifecycle management</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Background in End User Accounts Management, Identity Access Management, and Privileged Access Management is mandatory. Background in Information Security is preferred.</span></span></span></span></li> <li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Must possess basic working knowledge of core technology and networking technology stacks, which may include but is not limited to;</span></span></span></span> <ul style="list-style-type:circle"> <li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Legacy and Modern IdPs such as Active Directory, LDAP, Entra ID, OKTA</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Cloud Computing</span></span></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Remote Access Systems</span></span></span></span></li> <li style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:&quot;BLK Fort&quot;"><span style="font-size:10.0pt">Database Servers</span></span></span></span></li> </ul> </li> </ul>
Powered by
HumanBit Logo