- UpvoteDownvoteShare Job
- Suggest Revision
LYB is seeking an SAP Security Specialist who can drive the design and execution of SAP projects through the understanding of SAP Platform Security with GRC. The SAP Security Specialist will have hands on experience with user and role management for SAP on-prem and cloud applications possessing an extensive experience in GRC Access Controls, ITGC Controls and monitoring, internal/external audit.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement data protection and identity access management policies to safeguard cloud resources and data. Working with product application teams, consult, develop and maintain infrastructure-as-code (IaC) templates using Terraform to provision resources, manage configurations, and ensure consistency across the cloud use cases, from foundational provisioning of application infrastructure to desired state configuration to application installation.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 7 years of progressive hands-on experience in Identity and Access Management solutions including design, implementation, and governance. We are seeking an exceptional Senior Identity and Access Management Engineer to join our team.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cloud Security Architect will direct and guide other technology teams within Crown Castle for all matters related to cloud security strategy and implementation, including Security Tools within Cloud ecosystems (Azure and AWS), Network IPS/IDS, Identity and Access Management (IAM), User Entity and Behavior Analysis (UEBA), Zero Trust, DevSecOps, Security Access and Service Edge (SASE) and Security Frameworks and Methodologies, and Threat Modeling.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data protection, cryptography, key management, identity, and access management (IAM), network security within SaaS, IaaS, PaaS, and other cloud environments.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The DCOQI will ensure MNHC maintains Patient Centered Medical Home (PCMH) recognition, and leads key system improvements in patient access, productivity, access, population-based quality improvement, and patient care management.
$108,000 - $122,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ideally looking for candidates working in hybrid cloud environments, or having a background with both on-prem and cloud-based IAM. What you'll be doing You'll be working in the following functional areas: policy driven security, Identity Governance, Access Management, and Privileged access management, user provisioning/de-provisioning, and federation.
$100,000 - $125,000 a yearExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on development/coding in Okta Integrating on-premise applications with a SSO solution and multiple IdPs using SAML Utilize IAM (Identity and Access Management) programs to enable federal clients to protect against digital identity risks.
Full-timeRemoteExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Current Network Security applications, services and appliances including Identity Management, Network Access Control, Application Layer Inspection, Content and Malware Filtering, Data Loss and Intrusion Prevention, zero-day threats, IPsec and SSL VPN, PKI, Two-Factor Authentication and other.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
As the security Engineer Principal Subject Matter Expert (SME) you need to be well versed in the design, deployment, implementation, and maintenance of Zero Trust Architecture (ZTA) informing security events, assessments, and security design consultation, with a focus on Identity Access Management (IAM) in support of ZTA.
$100,000 - $130,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our client is looking for an Azure Administrator to support the State of Michigan Privileged Access Management team in their effort to onboard all privileged accounts into CyberArk. This work will entail working with agencies inside the state and tracking progressions with Azure Dev Ops. Each agency will be different, but your work will generally involve meeting with agency stakeholders to determine the business requirements they have for privileged accounts.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Some of the areas that you will focus on include identity access management, infrastructure-as-code, cloud services, Kubernetes/container solutions, and vulnerability management.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This Identity Access Management Analyst using Microsoft Azure identity and access management solutions will help protect access to applications and resources across the corporate data center and into the cloud.
ExpandApply NowActive JobUpdated Yesterday
identity and access management jobs
FEATURED BLOG POSTS
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.