HamburgerMenu
hirist

Job Description

Role : Sr. IT Engineer - Infrastructure (IAM SailPoint)

Experience : 6-10 Years

Employment Type : Full-time

Job Summary :

We are seeking a highly skilled and experienced Sr. IT Engineer - Infrastructure with 6-10 years of experience, specializing in Identity and Access Management (IAM) with a strong focus on SailPoint. This role is pivotal for designing, building, testing, and implementing robust information security technologies, including infrastructure and supporting applications related to data protection, network security, end-point security, threat monitoring, and specifically IAM.

You will manage IT security projects through all phases, collaborating with internal technology risk teams, infrastructure management, and external business groups to deliver secure and scalable solutions. This position also involves maintaining a broad understanding of infrastructure security operations, contributing to long-term security technology direction, and providing technical subject matter expertise for ongoing risk assessment and mitigation.


Essential Responsibilities :


Security Solution Design & Implementation :


- Design, build, test, and implement information security technologies including infrastructure and supporting applications related to data protection, network security, end-point security, threat monitoring, and/or IAM (Identity and Access Management).

- Manage IS projects through both pre-production and implementation phases.

- Collaborate with internal technology risk teams, infrastructure management, and external business groups to understand requirements and design and implement solutions accordingly.

- Test and validate upgrades, enhancements, or new technologies prior to production implementation.

- Provide incident support to help resolve and remediate application production issues.

- Implement new security controls as appropriate to resolve incidences and mitigate threat risks.


Architectural & Strategic Contribution :


- Maintain a broad understanding of infrastructure security operations.

- Collaborate with the IS Architecture & Strategy team to help develop and validate the long-term direction for security technologies.

- Provide technical subject matter expertise to support the ongoing assessment and mitigation of information security risks.


- Provide recommendations and input on options, risks, costs, and benefits for system designs.

- Collaborate with architects and software engineers to ensure functional specifications are converted into flexible, scalable, and maintainable designs.

- Verify system designs adhere to company architecture standards.

- Drive physical architecture design for new initiatives.


Technical Development & Operations :


- Leverage DEVOPS, Waterfall, and Agile practices to design, develop, and deliver resilient, secure, multi-channel, high-volume, high-transaction, on/off-premise, and cloud-based solutions.

- Develop and modify solutions by identifying technical solutions to business problems.

- Provide consultation and technical advice on IT infrastructure planning, engineering, and architecture for assigned systems by assessing the implications of IT strategies on infrastructure capabilities.

- Lead the implementation of assigned enterprise infrastructure systems by developing and documenting detailed standards (e.g., guidelines, processes, procedures) for the introduction and maintenance of services.


Collaboration & Communication :


- Translate business and functional requirements into technical specifications that support integrated and sustainable designs for designated infrastructure systems.

- Serve as a liaison with business partners, Solutions, and enterprise architects to define and understand target strategies.

- Collaborate with counterparts in various IT Teams (e.g., database, operations, technical support) throughout system development and implementation.

- Collaborate with IT teams and key business partners to troubleshoot complex systems and provide solutions.


System Evaluation & Improvement :


- Evaluate existing systems to make recommendations on resources required to maintain service levels.

- Evaluate new service options, identify issues and impacts, and provide recommendations on feasibility and ROI.


- Support the review of team deliverables.


Job Qualifications :


Experience :


- Minimum four (4) years experience in the planning, design, and implementation of IAM infrastructure or security solutions.

- Minimum two (2) years in the configuration, implementation, and operation of infrastructure or security technologies.

- Minimum one (1) year in a technical lead role (with or without direct reports).


Education :


- Bachelor's degree in Computer Science, CIS, or a related field AND Minimum six (6) years experience in an IT operations environment with technical experience in distributed technologies, systems development, and/or networking.

- Additional equivalent work experience may be substituted for the degree requirement.


Core Technical Skills :


- SailPoint experience for access governance.

- Extensive knowledge of Windows and UNIX/Linux environments.


Additional Requirements :


- Software Engineering Practices : Good knowledge of continuous integration, configuration management, build optimization, build automation, and deployment.

- Configuration Management/Version Control : Strong familiarity with software configuration management systems and/or source code version control systems (e.g., Git, GitHub).

- Scripting Languages : Strong knowledge of most scripting languages such as Perl, Shell Script, Python.

- Deployment Experience : Proven track record of deploying large, complex implementations.

- Communication Skills : Good written and verbal communication skills; ability to explain complex concepts.

- Analytical & Problem-Solving : Proven analytical and problem-solving ability.

- Organizational Skills : Good organization and interpersonal skills, ability to balance and prioritize work.

- Teamwork : Experience working in a team-oriented, collaborative environment.

- Confidentiality : Must be trustworthy in keeping sensitive data confidential.

- Adaptability : The ability to learn and apply new concepts quickly.

- Information Security or internal IT audit experience a plus.


Preferred Qualifications :


- Experience Substitution : In lieu of a Bachelor's degree, equivalent work experience of three (3) years may be substituted for a total of eight (8) years of experience.


IAM Technologies :


3 years of hands-on experience in two or more of the following IAM technologies :

- SailPoint for access governance.

- CyberArk for privileged access management.

- Ping Technologies (PingFederate, PingAccess, PingID, PingRisk Intelligence, PingDirectory).

- Venafi for certificate management, MS PKI.

- Automation : 2 years working knowledge in Build and Deployment automation using Ansible, Selenium, Java, APIs, SQL.

- Engineering Tools : 3 years experience with engineering tools such as bug tracking and source code control systems.

- Organizational Context : 3 years experience working in a large matrixed organization.

- Technical Documentation : 3 years experience writing technical documentation in a software development environment.

- Mobile Applications : 2 years experience developing and/or implementing mobile applications.

- Version Control : 2 years experience working with Git source code control.

- Third-Party Integrations : 2 years development experience integrating with third-party systems.

- Web Services/APIs : 3 years experience working with web services (API Framework).

- DevOps Tools : 2 years working knowledge of GITHUB, Maven, Jenkins, and UCD or any other deployment tool.

- Security Architecture : Experience supporting security architectures and solutions consistent with information security policies, standards, and strategy.

- Personal Attributes : Highly motivated, self-starting, committed to achieving results, strong sense of ownership and follow-through to resolution.

- Work Environment : Possess organizational proficiencies to multi-task and work in a fast-paced environment under limited supervision.


IAM Domain Expertise :


- Experience in Identity and Access Management Applications.


- Identity Lifecycle Management.

- Identity Data Models.


info-icon

Did you find something suspicious?