- UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Capital One SailPoint Engineer, you’ll work on a SailPoint identity platform to support Identity Access Management needs. Develop and implement best in class Identity Management solutions on the SailPoint IdentityIQ platform.
$29ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize programming languages like BeanShell, Javascript, Typescript, SQL, RDBMS and NoSQL databases, and a variety of AWS tools and services. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
$29ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serves as a technical resource to advise on risks as it pertains to Data Loss Prevention (DLP) tools, security monitoring, identity and access management implementation, and other domains across the cybersecurity ecosystem.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of domain expertise with Data Loss Prevention, Identity and Access Management, Security Information and Event Management, or Network Security.
$199,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deploy strong identity and access management (IAM) controls across applications and computing environments. We are looking for a driven Cloud Security Engineer to help plan, design and implement security solutions and controls within SimpliSafe’s AWS Cloud environment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in build, configuration, and architecture of one or more privileged identity & access management platforms, such as CyberArk, Beyond Trust and Thycotic, Experience in secret Management tools and platform such as Cyberark Conjur, AWS secret Manager, Hashicorp.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with security technologies such as firewalls, intrusion detection/prevention systems (IDS/IPS), encryption, and identity and access management (IAM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data protection, cryptography, key management, identity, and access management (IAM), network security within SaaS, IaaS, PaaS, and other cloud environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
NOT looking for someone with solely Cybersecurity experience, must have more focus in identity access management. access management – binary or artifact scanning, distribution, maintaining.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong foundational knowledge across Amazon Web Services and/or Microsoft Azure technology stack with special emphasis on AWS IAM, cloud secrets management, privileged access management, and AWS Config best practices, processes, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: o SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) o RSA Security Analytics (NetWitness) o Symantec Bluecoat o Cisco FirePower (SourceFire) o SplunkRequired Education: Bachelor's degree in Software Engineering, Computer Science or a related discipline is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes partnering with Risk Management, Identity/Access Management, Information Security and Privacy, and Disaster Recovery and Business Continuity Plans.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Architect security solutions for data protection such as identity and access management to address security weaknesses, and work with relevant stakeholders to implement them.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of Identity & Access Management security controls and tooling. Design and implement identity and access management (IAM) solutions for secure access control.
ExpandApply NowActive JobUpdated Today
identity and access management aws jobs
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.