IAM Consultant: Technical Specialist
Position Introduction
The IAM Consultant: Technical Specialist position requires an experienced information technology and cybersecurity administrator or engineer with strong communication skills to participate in the development and deployment of IAM technology solutions. This position requires an individual with experience supporting and maintaining information technology solutions and the interest and capacity to quickly learn and develop deep identity and access management technical skills.
This person will participate in IAM stakeholder requirements workshops, document requirements, and develop and maintain detailed technical design documents for IAM solutions including lifecycle policies, data mapping, workflows, and IAM solution configuration. This position works closely with project managers and technical leads to gather and document requirements, document and validate technical designs, provide input for deployment plans, and participate in IAM solution development, unit testing, bug fixing, deployment, and administration.
Key Responsibilities
- Requirements gathering and design for IAM solutions;
- Configuration, development, and testing of IAM solutions;
- Deploying and integrating IAM solutions;
- Deploying end user service delivery (e.g., claim, password management, and approval/workflow services);
- Development, configuration, and deployment of design changes and enhancements to the IAM solution to meet business requirements;
- Coordinating with client technical resources to prioritize prerequisites and remove technical barriers to completing scope of services;
- Troubleshooting and resolving issues with identity data aggregation, data management, credential provisioning and deprovisioning, access provisioning and deprovisioning, account claim, onboarding notifications, password management, and enterprise authentication;
- Supporting IAM technical assessments and planning initiatives.
General Qualifications
- Bachelor’s Degree or in progress/near completion or an Associate’s Degree and 5+ years of experience;
- 3+ years of experience in information technology;
- 1+ year of experience in systems/server administration, directory administration (e.g., LDAP or Active Directory), database administration, and or cybersecurity analysis;
- Strong oral and written communication skills;
Technical Qualifications
- A minimum of 3+ years of experience with installation, integration, and deployment of IT systems, network, directory, or database solutions;
- Knowledge and familiarity with Identity and Access Management concepts and services such as:
- Single Sign On
- Identity Federation
- Multi-factor authentication
- Enterprise directory and authentication services
- Identity, credential, user lifecycle, and access provisioning and deprovisioning
- Identity & Access Governance including role-based access control (RBAC), access request and certification
- Proficiency in multiple scripting languages (such as JavaScript, PowerShell, php, python, shell scripting, RegEx) or development languages (such as Java);
- Understanding of fundamental cloud computing concepts and experience with web services and APIs (e.g., XML, REST, SCIM, GRAPH, etc.);
- Knowledge and experience working with a variety of directory platforms and authentication services;
- Capacity to quickly analyze technical problems and resolve issues;
- Ability to multi-task on several projects;
- Ability to communicate directly with client technical resources to keep projects moving;
- Knowledge and experience with information security best practices;
- Strong technical writing skills;
- Self-managed and ability to work remotely.
Desired Skills and Experience
- Working in higher education information technology;
- Working in healthcare information technology;
- Working in K-12 information technology;
- Knowledge and experience with server hardware, virtual server, and cloud (IaaS) environments;
- Knowledge and experience working with network systems configuration, design, and deployment;
- Knowledge and experience working with a variety of database platforms and database administration;
- Understanding of fundamental cloud computing concepts;
- Experience with information assurance concepts and processes;
- Knowledge of and experience with security regulations, standards, and processes;
- Fundamental understanding of software, computer, and network architectures.