- UpvoteDownvoteShare Job
- Suggest Revision
Responsible for the development of organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity & Access Management to end users, leadership, and peers to ensure compliant practices.
Full-time/part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Requirements:Potential for Extension: YesPotential for Conversion: YesNO HB's - USC or GC onlyLOCAL CANDIDATES ONLYREQUIRED: Hybrid Onsite Days per week - Tuesday, Wednesday, and ThursdayProfessional Skills+ years of experienceIdentity Management (SailPoint Administration)Extensive hands-on knowledge of IAM best practices, procedures, and software solutions such as CyberArk, Okta, Ping Identity, and Directory Services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for user account life cycle management, including creating, provisioning, securing, and inactivation of access · Responsible for the design, implementation, and support of the IAM technologies across the following platforms: SailPoint, CyberArk, Venafi (Certificate Management), and Okta · Responsible for troubleshooting, identification, and resolution of technical IAM related issues.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience in administration, configuration and troubleshooting on CyberArk modules: Enterprise Password Vault (EPV), Password Vault Web Access (PVWA), Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Session Management Proxy (PSMP), Privileged Threat Analytics (PTA.
$97,613 - $188,375 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a part of our Identity and Access Management (IAM) team you’ll be right at the heart of that goal, helping clients gain insight and context to their complex IAM environments and assessing, improving, and building infrastructure, processes and policies in order to meet the client’s IAM needs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Made up of Square, Cash App, Spiral, TIDAL, and TBD, we build tools to help more people access the economy. TBD is building an open developer platform to make it easier to access Bitcoin and other blockchain technologies without having to go through an institution.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develops Enterprise Risk Management tools, practices, and policies to analyze and report enterprise risks, and to manage risks according to an enterprise risk management framework.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Performing full or targeted scope validation assessments.b. Reviewing validations to ensure TAS concurs with the conclusions made by the Model Risk Management Team (MRM) within Truist.c. Assessing methodology, implementation, and the fit for use status of models.d. Reviewing various other components of models given the model’s expected use and the scope of the Audit project.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead end-to-end project delivery for management consulting projects, from project initiation, through analysis, solutions development, implementation, and closeout; projects can span organizational development and transformation, strategic planning and implementation, business process improvement, risk management, and change management and strategic communications, as well as direct-mission support to federal health clients.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Domain knowledge for the following cybersecurity capability areas: Application Security, Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, Identity and Access Management, Cyber Threat Operations, Cybersecurity Testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Policy and Procedure Development: Establish and document policies, procedures, and guidelines for SOX compliance related to Workday system administration, access management, and data security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The first-line CISO has operational responsibilities and reports to the CIO. The second-line Chief Tech Risk Officer (CTRO) and the Technology Risk Management (TRM) organization have broader responsibilities for cybersecurity but also reliability, software quality, resilience, and other technology risks.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Security: Proficiency in cloud security and experience with cloud service providers (e.g., AWS, Azure, Google Cloud, O365) and SaaS Data Security, knowledge of secure cloud architecture design, cloud data protection mechanisms, and cloud identity and access management (IAM.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform the design, planning, QA/QC, implementation, assessment, and management of access control systems, digital video surveillance systems, CCTV (Closed-circuit television), building security, building automation, and physical intrusion detection systems.
Full-timeExpandApply NowActive JobUpdated Today
management risk identity and access jobs Title: senior consultant in Atlanta, CA, Arkansas
FEATURED BLOG POSTS
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
Recruiting in a Recession: Hard Truths That Talent Acquisition Experts Must Accept
The summer had economists from around the globe embroiled in a debate about a possible recession coming in the next few years (or months). As of October 2022, the U.S. Labor Department data put the current inflation rate at 7.7%. The recent layoffs in the tech industry are just the first of what is soon to be a string of cutbacks by companies looking to save costs. For recruiters, this means freezes in hiring and fewer openings. It will also include the uphill task of finding the best candidates for them from the coming influx of recently laid-off job seekers. Now is probably a good time to brace for tough times in the next few years in the talent acquisition industry. To survive and thrive recruiting in a recession, here are some hard truths you will need to accept.
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."