- UpvoteDownvoteShare Job
- Suggest Revision
Experience in Secure Access Service Edge (SASE), Cyber Threat Management (e.g., Nessus, Veracode), Security and Data Analytics (e.g., Splunk Cloud), Security Automation and Orchestration (e.g., Splunk SOAR), and Identity and Access Management (e.g., ForgeRock, SailPoint, CyberArk.
$170,000 - $210,000Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CloudOps also executes Identity & Access Management, Role-Based Provisioning, Upgrades, Deployments, and Change, Incident and Problem management to drive faster time to market.
$110,500 - $190,500 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Job descriptionSenior Solution Architect in Verizon Global Technology Solutions (GTS) organization focused on Identity Access Management, API Gateway, Application Security, Public Cloud Architecture and end to end solutions.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with Landing zones for standardized Identity, Access, Management, Monitoring, Deployment. The Engineer will provide strategic Cloud Architectural/Engineering leadership while guiding a DevOps team and Application teams across multiple value streams.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain external access to ALS tools including identity and access management for external stakeholders. Maintain ALS system infrastructure (storage, compute, network) leveraging on-premise and AWS cloud platforms.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of fundamental cloud security concepts such as identity and access management, firewalls, encryption, etc. You will be responsible for helping support and refine end-to-end continuous integration and continuous delivery (CI/CD) pipelines, configuration management and infrastructure as code, and cloud security best practices.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Application Security, Network Security, Virtual Private Networks (VPN), Identity and Access Management, Data Security, Cloud Security, Critical Infrastructure Protection (CIP) Systems, Transient Devices, Control System Security, Cyber Security Monitoring and Protection solutions and Encryption.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in implementing security best practices on GCP, including identity and access management (IAM), encryption, and threat detection. Expertise in analyzing and optimizing cloud costs, using tools like Cloud Billing and Cloud Cost Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Active Directory and Identity Access Management. Designing, building, managing, maintaining, and securing HMG’s cloud infrastructure (virtual machines, containers, virtual private cloud network, identity management, storage, database and serverless services.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyze Identity & Access Management business requirements, processes, documentation, and workflows through interviews with customer personnel, develop gap analysis with TruU platform and document proposed solution approaches and workflows.
$125,000 - $150,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Identity and Access Management (IAM) RBAC, Conditional Access Policies, Entra ID, PIM/PAM, Entra ID Connect, AD FS, PHS, ID Protection, MFA. Ability to work with application and security teams to promote a secure posture in the cloud.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In a world of digital transformation, where organizations are faced with increasing cyber risk but cannot afford defensive measures to slow down progress, Saviynt's Enterprise Identity Cloud gives customers unparalleled visibility, control and intelligence to better defend against threats while empowering users with right-time, right-level access to the digital technologies and tools they need to do their best work.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide guidance to clients that are selecting, deploying, and operating Identity and Access Management technologies and services in both corporate and cloud environments.
Full-timeRemoteExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years' experience working with Identity and Access Management (IAM) principles, including authentication, authorization, and security protocols. Familiarity with cloud platforms (e.g., AWS, Azure, Google Cloud) and containerization technologies (e.g., Docker, Kubernetes.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Anypoint (and above) platform configuration and setup including identity management, Client management, Roles and access, environment, VPC, DLB, VPC sizing, firewalls, network, cloud concepts etc + years of experience in systems architecture and development of application integration solutions Designing integration solutions using various approaches such as Microservices, messaging, queuing, API management and patterns, etc.
$45 - $50ExpandApply NowActive JobUpdated Today
identity and access management cloud jobs in Dallas, TX
FEATURED BLOG POSTS
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.