Access Management Support Analyst

Company Name:
Satnam Data Systems , Inc.
This position is responsible, but not limited to identifying business applications to incorporate into SailPoint, implementing these new applications, and providing on-going support for all identity management systems as part of the OWB IT Security Integration program.
The successful Identity Management Analyst will also work with business users, Identity Management personnel as well as all other IT personnel to bring about timely resolution to all questions or needs related to certification of access, reporting, and audit concerns.
Minimum Required Skills and Experience
4-6 years' experience in Identity Access Management
4-6 years' experience with SailPoint IIQ 6.1 or higher and SailPoint IIQ, Oracle OIM/ORM 11g, Java, SQL, Microsoft Office, Visio, SharePoint site administration
Experience in administering and supporting Active Directory
Strong knowledge and experience in user provisioning, entitlement review and certification, enterprise directory architecture and design, role based access control, single sign on, identity federation, multi-factor authentication and privileged access management
Working Knowledge of Operating Systems (Windows Server, RedHat Linux)
Working knowledge of the SDLC
Requirements analysis, strategy, design and implementation of Identity & Access Management and Governance solutions
Good understanding of service management concepts (ITIL)
Ability to quickly adapt to rapidly changing business needs and operational directives and deliver superior results.
Ability to take ownership of systems and processes and work both independently and in collaboration with team members
Ability to independently, quickly and efficiently identify and solve technical problems
Strong verbal and written communication skills.
Ability to adapt information delivery based on target audience
Ability to participate in on call rotation
3+ years of experience in the Information Security industry, preferably in financial services or other highly regulated environment.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

VP - Privileged Access Management , Business A...
Jersey City, NJ JPMorgan Chase & Co.
Sr. Business Analyst (Privileged Access Manage...
Hoboken, NJ MARRS Professional Services Inc
Sr. Business Analyst (Identity & Access Manage...
Hoboken, NJ MARRS Professional Services Inc
Technical Application Support Analyst (Sterling)
Parsippany, NJ Tiffany & Co.
OIM Senior Engineer Identity and Access Mana...
Trenton, NJ U.S. Bank
Application Support Analyst, Wireless IT.
Warren, NJ RiVi Consulting