[Close] 

Sr. Privileged Access & Identity Management Engineer

Role Specific Responsibilities Strong knowledge is required in: Windows server 2012/2016 administration with proven experience with troubleshooting 2008/2012 Active Directory administration skills, including AD monitoring, troubleshooting, and Group Policy Management Privileged Access Management (PAM) or Privileged Identity Management (PIM) concepts and processes Active Directory Federation Services PowerShell scripting Support ticketing systems (ServiceDesk, ServiceNow, etc.) Experiences is a plus in Microsoft Certificate services Thycotic Secret Server / CyberArk / BeyondTrust Identity management products like FIM 2010R2 and MIM 2016 Multi-factor authentication technologies Microsoft Rights Management Services Office 365 technologies to include Cloud applications and AAD Connect Network Policy Server / RADIUS server Data center architecture and implementation Additional responsibilities Understand the important aspects of running a 24/7/365 operations center Understand and able to operate within a process driven organization Excellent English verbal and written communications skills Sensitivity and cultural awareness is essential as the role will involve contact with a variety of people around the globe Discipline and experience in recognizing and handling confidential and sensitive information. Excellent time management and attention to detail Essential to produce quality work, adopt standards and adhere to those standards Must be able to think out of the box. The ability to troubleshoot non-standard issues/undocumented issues, to look at the big picture and see how a problem fits in and determine a solution that fits within the existing framework Provide input to assist with continual improvement Accountable for execution according to established standards, procedures, and processes Monitor the Service Desk system Participate in planned "Systems Day" and other maintenance activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Report any breaches in information security or policies

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Sr. Manager - Information Systems Security Ris...
King Of Prussia, PA Lockheed Martin Corporation
Content Management Student Assistant
University Park, PA PennState
Clinical Program Manager, AFRICA / MENA
Plymouth Meeting, PA Inovio Pharmaceuticals, Inc.
Sr. Associate, Data & Analytics Consultant, He...
Philadelphia, PA KPMG
Principle Scientist, Antibody Engineering
Wayne, PA The Richmond Group
Hardware Engineering with Security Clearance
King Of Prussia, PA Lockheed Martin Corporation