Bachelor's degree in Computer Science, Management Information Systems, or related technical field; or equivalent work experience. 3-7 years of experience in Information Security Services or related technical field.
Candidate will need to demonstrate proficiency in Identity & Access Governance (IAG) Capabilities, Services and Processes.
Technologies like RSA Identity Governance & Lifecycle (formerly Aveksa), SailPoint, or similar.
Work experience that spans the Identity & Access Management or Governance, Risk, and Compliance security domains.
Effective verbal and written communication skills that include the ability to describe highly technical concepts in non-technical terms.
Very good understanding of security controls, monitoring systems and regulatory/business drivers that impact security policies and practices. Working with business users on platform related questions/issues
Good to have skills
In addition, the successful candidate will need to meet below requirements:
Interested in gaining broad experience in Information Security Services [must have]
First level knowledge and/or demonstrated technical ability to understand code and technology infrastructure in multiple environments with experience in the below languages [Python, Powershell, Java Script, SQL, Regular expressions-based programming]
Strong attention to detail, follow-through, and time management skills.
Demonstrated aptitude to quickly learn and apply new tools and processes
Presentations (Creating and Delivering)* Risk Identification and Remediation*
Project Coordination
Reporting (SQL queries to databases) / Correlation
Participate in on-going operational activities that serve to establish appropriate access to and provide the appropriate protection, confidentiality, integrity and availability of enterprise systems and data through effective security controls.
Validate compliance with policies and standards that keep Ameriprise applications and infrastructure safe and secure from vulnerabilities.
Responsibilities Provide timely and effective operational support for the firm's information security tools, processes, and practices. Partner with other support teams and vendors to resolve problems.
Use standard technology monitoring tools to monitor assigned environments and/or technical assets and identify/detect behavior outside of established standards.
Escalate key issues to the appropriate team to be addressed. Review, analyze and respond to events triggered through automated monitoring systems. Coordinate responses to incidents.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.