leveraging Microsoft Azure IaaS, PaaS, and SaaS capabilities. Expert-level experience with Active Directory federation services (SAML, Single Sign-On (SSO), Two-Factor authentication, RBAC and other related and Access Management (IAM) technologies. Knowledge of cloud security controls, including conditional access policies, tenant isolation, encryption at rest more »
IaC) using tools such as Terraform. Strong identity knowledge, including authentication protocols, Identity Lifecycle Management, Privileged Access Management, RoleBasedAccessControl and Identity Governance. Excellent verbal and written communication skills. Essential Background Promote cyber security standards, procedures & guidelines, and more »
SAP Business Warehouse and Master Data Management. Experience with integration patterns and methods like REST, JSON, XML or SOAP web services. Knowledge of SSO, RBAC, MFA in Azure AD and other modern authentication concepts. Up-to-date knowledge of cybersecurity threats, current best security practices, threat modelling and risk more »
automated build and configuration tools such as Harness, Cloudbees, and Terraform Experience with Azure Networking (VWANs, Express Routes, etc.) Experience with in Azure AD RBACSecurity models Experience with Azure Functions Morningstar’s hybrid work environment gives you the opportunity to work remotely and collaborate in-person each week. more »
and supporting IGA solutions. Extensive experience with IAM solutions (specifically SailPoint IdentityIQ). Proficient in IAM concepts, including identity lifecycle management, access provisioning, RBAC, and entitlement management. Experience developing and configuring common SailPoint connectors including Active Directory (AD), Azure AD, JDBC, Exchange, mainframe, web services, and authoritative source integrations more »
Directory, SAML, SSO, OAuth2, OpenID Connect and web protocols like XML, SOAP, JSON, and REST. Familiarity with accesscontrol models such as RBAC, ABAC and ReBAC. Enthusiasm to work with and learn more about Identity Protocols like OAuth2, OIDC, and SAML. Experience with SQL. Hands-on experience implementing more »
and CloudWatch to maintain alignment with SOC2 and FedRAMP standards. IAM Strategy Development: Design and maintain comprehensive IAM strategies for AWS and Azure, incorporating RBAC, fine-grained permissions, and automated key rotation. Security-First Cloud Architecture: Implement security-first cloud architectures, integrating advanced threat intelligence and vulnerability management more »
REST APIs Experience with infrastructure-as-code frameworks such as Terraform, CloudFormation, Ansible, Puppet, or PowerShell DSC Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require Engineering background in Computer Science, Mathematics, Software Engineering, Physics or similar field Familiarity with data more »
frameworks such as Kafka Streams, Flink, or Spark Streaming Knowledge of security best practices , including IAM, encryption, and role-basedaccesscontrol At least 5 plus years of experience in cloud engineering, DevOps, or backend platform development Hands-on experience with more »
Python, SQL, and Scala for data processing. Strong understanding of Azure networking, security, and IAM , including Azure Private Link, VNETs, Managed Identities, and RBAC . Deep knowledge of enterprise-scale data architecture patterns , including Lakehouse, Medallion Architecture, and hub-and-spoke models . Strong problem-solving skills and ability more »
For ... 3+ years as a Business Analyst in IAM/IGA environments . Strong expertise in SailPoint IdentityNow/IdentityIQ. Knowledge of ILM, RBAC, ABAC, and IAM compliance frameworks. Experience with Active Directory, LDAP, SAML, OAuth, and OpenID Connect. Strong documentation, stakeholder communication, and process improvement skills. Solid experience more »
preferred. Deep understanding of IAM tools and technologies, such as multi-factor authentication (MFA), single sign-on (SSO), Role-basedaccesscontrol (RBAC) and identity governance. Experience with Powershell scripting. Familiarity with Terraform and Infrastructure as Code tools and concepts. Familiarity more »
cyber security principles and architecture points • Boundary controls, network segmentation and accesscontrol • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • Vulnerability Management and Patching • SIEM principles, products and supporting logging more »
integration touch-points between different applications. Provide recommendations to improve performance after performing Performance Optimization exercises on Microsoft Dynamics environments. Role-basedsecurity design. Strong client interaction skills. Working independently and in teams. Excellent Analytical and Communication skills. Able to manage a team more »
monitoring-as-code , log collection, and alerting for infrastructure and applications. Security & Reliability Improve cluster networking, ingress traffic management, and security policies (RBAC, network policies, PodSecurityPolicies, vulnerability scanning) . Enhance disaster recovery strategies, backups, and high-availability configurations. Collaboration & Best Practices Work closely with developers to troubleshoot performance more »
a related field. In-depth knowledge of identity and access management concepts, such as JML, access recertification, role-basedaccesscontrol, and identity federation. Willingness to learn new technologies and keep up with industry trends. Familiarity with best practices and more »
services and REST APIs Experience in mentoring, serving as a tech lead, or leading an engineering team Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require 5+ years of software development experience 2+ years of experience contributing to the system design more »
services and REST APIs Experience in mentoring, serving as a tech lead, or leading an engineering team Familiarity with accesscontrol models (RBAC, ABAC, etc.) and user lifecycle management workflows What We Require 5+ years of software development experience 2+ years of experience contributing to the system design more »
of working with HR teams to build an outstanding JML experience for users across a large corporate user base Experience of developing and deploying RBAC in a similar environment with examples of an evolution of the design (self service, JML) What's in it for you Our goal is to more »
/CD security, SAST/DAST, and secure coding practices. Identity : Proficiency with identity and IAM tools and best practices, such as MFA, RBAC, and PAM, (e.g., AAD, SSO, Okta). Data : Knowledge of data protection practices, such as encryption, key management, and DLP. Industry Knowledge: Frameworks : Ability to more »
is a plus. Deep and proven technical knowledge in Risk/Fraud and Identity and Access technologies - SSO, SAML Federated Identity, OAuth, OIDC, RBAC, REST APIs, Certificates and Management (trust chain), Identity Orchestration, WebAuthn (FIDO2 Passkeys). Technical awareness of AWS, Azure, GCP cloud architectures and OpenShift and Kubernetes more »
knowledge of Saviynt, AzureAD, and CyberArk. Strong working experience in Identity or a related field. In-depth knowledge of role-basedaccesscontrol within identity and access management concepts. Also, a working knowledge of JML, access recertification, and identity federation. more »
a related field. In-depth knowledge of identity and access management concepts, such as JML, access recertification, role-basedaccesscontrol, and identity federation. Willingness to learn new technologies and keep up with industry trends. Familiarity with best practices and more »
frameworks (PKI, digital signatures, TLS/mTLS) Ability to conduct threat modeling and identify security requirements Experience with container security (EKS, Kubernetes RBAC) Familiarity with DLP solutions Understanding of security frameworks (NIST, ISO 27001, CIS, NCSC, OWASP) Experience with SIEM tools and threat detection systems more »
Broad knowledge around network technologies (especially cloud) and technical security Awareness of architectural principles for technical solution design, e.g. Zero Trust, least privilege RBAC, Security by Design, PAM, Segregation of Duties Data Protection and DLP Experience with the following would also be beneficial: NIST, SOC2 and additional compliance more »