Function: Information Security
Stamford – US
Band – 4D
Positions – 1
With a startup spirit and 80,000+ curious and courageous minds, we have the expertise to go deep with the world’s biggest brands—and we have fun doing it. Now, we’re calling all you rule-breakers and risk-takers who see the world differently and are bold enough to reinvent it. Come, transform with us.
Inviting applications for the role of Senior Consultant – Application Security, Identity and Access Management
Ismile Technologies is seeking for a senior consultant to support the design of information security systems and solutions that effectively balance business needs with cyber security requirements
The candidate will be responsible for supporting Identity and Access Management (IDAM) services, Privilege access management (PAM), security design and architecture for SaaS Application, Security controls review for Azure cloud infrastructure and performing application security assessment.
Required Skills and experience
Strong foundations on design of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements.
Strong understanding of Information security concepts including authentication, authorization, SAML, with experience on Identity and access management (IAM), Single Sign-On (SSO), Risk based authentication, Multi-factor authentication technologies
Strong understanding of Windows Active Directory, UNIX, Linux & SSH key management
Strong understanding of network hardware configuration and password management options (SSH, ACS, LDAP), Database authentication methods and techniques (standalone, LDAP/AD, others), Privileged Management processes, like Access Control, User Entitlements, Manage
Experience of deploying and running IDAM and PAM in a large complex environment.
Experience in conducting application security reviews for SaaS and inhouse developed applications.
Experience in conducting architecture reviews for azure cloud infrastructure deployments.
Experience in outlining the risk associated with the applications and cloud infrastructure and recommend the necessary controls to mitigate those risks.
Experience on one or more of the following technologies: BeyondTrust, CyberArk, ObserveIT, Dell,
Exceptional communication skills with diverse audiences – Strong critical thinking and analytical skills with ability to be the enterprise security subject matter expert who can explain technical topics to those without a technical background
Strong leadership, project and team-building skills, including the ability to lead teams and drive projects and initiatives with multiple departments
Demonstrated ability to identify risks associated with business processes, operations, information security programs and technology projects
Security professional certifications such as CISSP, CISM, CISA, ISSAP, ISSEP, CEH etc.
• Relevant Bachelor’s degree (or equivalent);
• 8-10 years of relevant experience