Base 3
Brussel (Stad), Brussel
Required Profile: years cyber security professional experience with at least 5 years in domain or enterprise architecture experience Deep knowledge of the IAM and CIAM framework and industry best practice, Identity Governance, Logical and Privileged Access Management, Role Modelling, Access Recertification, and authentication mechanisms. Familiar with market leader's products CyberArk, SailPoint, Microsoft Azure AD, Microsoft AD, Beyond Trust, One Identity and its implementation in a strong regulated and complex environment. Knowledge and experience with security technologies, identity management platforms, secure access management and federation, IDAAS (Identity as a service), Single Sign On, SAML, Opend ID Connect, OAUTH, multi-factor authentication, PKI and cryptographic solutions, web application Firewalls, automated code review tools, Cloud SAAS solutions Worked in financial or highly regulated industries. Professional certifications such as TOGAF, SABSA or IAF architecture frameworks. CISSP, GIAC, CISM, ISO 27001 LA/LI or specific security product certifications are an asset. Fluent in English mandatory. As a the Cyber Security IAM Architect, your role will include: Lead the Identity and Access Management architecture domain. Define the IAM strategy, the reference/target Architecture, blueprint for your domain in close collaboration with your stakeholders (IDAM, GTS, GBS, Security Architecture and Enterprise Architecture). Design the architecture principles, tools, patterns, building blocks and contribute to IAM policies, standards and solutions. Advise on solution designs, implementation, and processes required to protect information system assets in line with the IAM and IT strategy. Provide guidance and act as a facilitator to ensure security standard and best practices are applied consistently and in a meaningful way across all divisions and the group. Collect feedback from stakeholders, detect unaddressed security IAM needs and identify opportunities for improvements or new architecture services. Translate the business requirements, risk assessments, high-level policies, and controls into security architecture requirements and designs for existing or new IAM capabilities, services and projects on business and IT side. Participate in discussions on IAM subjects, operational process design and implementation of security controls into project delivery. Your stakeholders are mainly Tribe Leads, Product Owners, Project Leaders, Enterprise Architects, risk management, internal/external Auditors and IT engineers, Developers and Solution Designers. Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
Required Profile: years cyber security professional experience with at least 5 years in domain or enterprise architecture experience Deep knowledge of the IAM and CIAM framework and industry best practice, Identity Governance, Logical and Privileged Access Management, Role Modelling, Access Recertification, and authentication mechanisms. Familiar with market leader's products CyberArk, SailPoint, Microsoft Azure AD, Microsoft AD, Beyond Trust, One Identity and its implementation in a strong regulated and complex environment. Knowledge and experience with security technologies, identity management platforms, secure access management and federation, IDAAS (Identity as a service), Single Sign On, SAML, Opend ID Connect, OAUTH, multi-factor authentication, PKI and cryptographic solutions, web application Firewalls, automated code review tools, Cloud SAAS solutions Worked in financial or highly regulated industries. Professional certifications such as TOGAF, SABSA or IAF architecture frameworks. CISSP, GIAC, CISM, ISO 27001 LA/LI or specific security product certifications are an asset. Fluent in English mandatory. As a the Cyber Security IAM Architect, your role will include: Lead the Identity and Access Management architecture domain. Define the IAM strategy, the reference/target Architecture, blueprint for your domain in close collaboration with your stakeholders (IDAM, GTS, GBS, Security Architecture and Enterprise Architecture). Design the architecture principles, tools, patterns, building blocks and contribute to IAM policies, standards and solutions. Advise on solution designs, implementation, and processes required to protect information system assets in line with the IAM and IT strategy. Provide guidance and act as a facilitator to ensure security standard and best practices are applied consistently and in a meaningful way across all divisions and the group. Collect feedback from stakeholders, detect unaddressed security IAM needs and identify opportunities for improvements or new architecture services. Translate the business requirements, risk assessments, high-level policies, and controls into security architecture requirements and designs for existing or new IAM capabilities, services and projects on business and IT side. Participate in discussions on IAM subjects, operational process design and implementation of security controls into project delivery. Your stakeholders are mainly Tribe Leads, Product Owners, Project Leaders, Enterprise Architects, risk management, internal/external Auditors and IT engineers, Developers and Solution Designers. Note: this role has been assessed as Inside IR35 which only affects UK resident candidates
Request Technology - Robyn Honquest
NO SPONSORSHIP Sr. RBAC Engineer - Expert Salary: $150k to $200k plus 20% bonus Remote - NO Alaska, North Dakota, Nebraska, Hawaii, Oklahoma, Vermont, Maine, West Virginia, Wyoming, New Hampshire, Puerto Rico. We need an RBAC expert preferably with SailPoint but not a must. You will own this space. IAM roles based Access Control will need to speak on it, will be a 10 out of 10. With role-based access control, permissions are based exclusively on roles, which simplifies administration. When a user's position changes, including if they sever relations with the organization, administrators simply change their role, and permissions are automatically updated. Using RBAC, users can be assigned multiple roles. User role assignment defines users' permission or access rights based on a role or task. User role authorization confirms that a user is approved for a role and to perform related functions. User role permission and access rights define specifically what a user can and cannot do. Access Modification Sharing Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Include the principles of RBAC and how it works in employee training programs. Take care not to create too many roles. Role-based access control helps organizations adhere to the data protection and privacy requirements set forth in myriad regulations by restricting access to resources.
NO SPONSORSHIP Sr. RBAC Engineer - Expert Salary: $150k to $200k plus 20% bonus Remote - NO Alaska, North Dakota, Nebraska, Hawaii, Oklahoma, Vermont, Maine, West Virginia, Wyoming, New Hampshire, Puerto Rico. We need an RBAC expert preferably with SailPoint but not a must. You will own this space. IAM roles based Access Control will need to speak on it, will be a 10 out of 10. With role-based access control, permissions are based exclusively on roles, which simplifies administration. When a user's position changes, including if they sever relations with the organization, administrators simply change their role, and permissions are automatically updated. Using RBAC, users can be assigned multiple roles. User role assignment defines users' permission or access rights based on a role or task. User role authorization confirms that a user is approved for a role and to perform related functions. User role permission and access rights define specifically what a user can and cannot do. Access Modification Sharing Analyze the users, including their workflows and the resources they need. Conduct audits of the roles on an ongoing basis to keep them up to date and align them with current requirements. Create a basic role that includes the access every user needs. Determine which roles have a common set of access requirements. Ensure RBAC is integrated across all systems across the organization. Establish a process for handling role changes, including setting up and decommissioning users. Identify the resources that require access control. Include the principles of RBAC and how it works in employee training programs. Take care not to create too many roles. Role-based access control helps organizations adhere to the data protection and privacy requirements set forth in myriad regulations by restricting access to resources.