A Journal of
Identity Management


Help Wanted

Newsletter archive (Network World)

Help Wanted

Oracle Identity Management (OIM) Lead
Posted: January 09, 2012
The Judge Group
(Providence, RI)
A key contributor to the Identity Management (IDM, IAM) initiative, this position is responsible for contributing to the design and support of the security middleware for centrally managed enterprise services. The incumbent is a member of a team responsible for design, implementation, integration and ongoing support of the service provisioning system and the authentication and authorization tools that leverage these provisioned services. The position is also responsible for insuring that new services integrate into the existing infrastructure.

Identity Management Engineer
Posted: January 09, 2012
(Karnataka, India)
NetApp is looking for an expert in web and federated Single-Sign-On (SSO), access management, and directory technologies. As an Identity Management Engineer you are part of a global IT team that is responsible for design, analysis, evaluation, testing, and implementation support of Identity and Access Management solutions. You will provide technical and subject matter support for the deployment of these services for on-premise hosted and cloud based applications. You will work closely with cross-functional teams to understand and address customer needs, provide support for identity and access management environments and participate in deployment of new features and functionality.

Sr. Analyst - Identity Management Architecture
Posted: January 07, 2012
Macy's Systems & Technology
(Johns Creek, Georgia )
Provides specialized enterprise level project based support and management to the MST FOB and remote IT departments for the Windows and Intel environments * Designs and implements Client and Server architecture to include hardware platforms, client applications, server services, Operating Systems, storage networks, and network equipment as it applies to enterprise infrastructure * Evaluates, tests, recommends and deploys new/upgraded hardware, OS, network, and infrastructure applications, integrating with existing system configurations

IT Security Specialist - Identity Management
Posted: January 04, 2012
General Dynamics Information Technology
(Washington, DC)
Candidate will be responsible for the following types of engineering tasks: Integration with Identity data source feeds (SQL, CSV, adapter-based); LDAP Design and configuration; Identity Management workflow and policy configuration supporting automated account provisioning, de-provisioning and electronic policy enforcement. IdM adapter-based account provisioning for systems and applications (Active Directory, Web SSO systems, etc.). Integration experience with Authentication / Authorization technologies (ex. Kerberos/NTLM, Cookies, SAML, RBAC, ABAC, etc.). Understanding of asymmetric key encryption technologies and methods (ex. PKI, S/MIME, CA's, RA's, or similar)

Senior IAM (Identity and Access Management) Archit
Posted: January 04, 2012
(San Francisco, CA)
The Information Security Architecture and Services (ISAS) function is responsible for the development of technical security standards, requirements and implementation of appropriate technology architectures to mitigate risks to McKesson and customer information assets

Identity Management Sr. Analyst
Posted: January 02, 2012
The Senior Analyst in the Identity Management area can be responsible or work with several areas of Identity management. Consulting on Active Directory, directory management, domain controller management, remote access, security, compliance, and provisioning automation and tools are some of the key areas. The Senior Analyst is expected to be technical and have a detailed understanding of each of these areas and a detailed understanding of the Identity Management services. The Senior Analyst will work with other analysts to deliver these services, will meet with customers in the different business areas to understand their requirements and to communicate the compliance processes.

Identity Management Engineer
Posted: December 21, 2011
Lawrence Berkeley National Lab
(Berkeley, CA)
Support Berkeley Lab's institutional identity management service by providing analysis, implementation, and on-going maintenance and support. The identity management service supports business, scientific, and collaboration systems used by LBL employees and partners with other institutions. Work closely with the CPP (Computer Protection Program) members to monitor, prevent, and mitigate computer security issues, especially in the realm of identity and access management. Work with a team to plan and implement major infrastructure upgrades. Interact with users or project teams to establish system specifications and resolve problems. Train users and other high-level systems professionals in implementation and operation of the most complex systems.

Identity and Access Management Developer
Posted: December 22, 2011
(Arlington , VA)
Candidates for the IAM Developer position will be responsible for developing and implementing solutions as per documented architecture and design documents. This candidate may also be responsible for assisting in gathering requirements to translate into the architecture.

Architect / Consultant - Identity and Access Manag
Posted: December 22, 2011
(London )
All Identity and Access Management (IAM) Architects should come from either an Oracle or IBM Tivoli technical background and be able to work on both a technical and business front. The right Architect will have experience of translating business requirements into system, scope, solutions and architecture definition. This role offers the right Identity and Access Management (IAM) Architects the opportunity to further push their career forward and work on large scale projects.

Senior Identity and Access Management Analyst
Posted: December 18, 2011
The George Washington University
(Ashburn, VA)
To support the Identity and Access Management Team in analysis and implementation of identity management, access management, and directory services solution at the University.

IAM Security Engineer
Posted: December 18, 2011
(Ft. Meade, Md)
Develop strategy and approaches to address the implementation of Identity and Access Management (IAM) solutions as part of the security services for existing DoD Programs that include Service-Oriented Architectures (SOAs), to enable assured information sharing across the Enterprise as well as with trusted mission partners. Interface with Senior Government leadership and Working Groups to develop governance processes, design reference architectures, and recommend new policies or changes to existing policies. Coordinate work across MITRE and its sponsors to understand the needs of different Government sponsors and provide an integrated view of the various ongoing MITRE activities to meet those needs.

Infrastructure Engineer (Identity and Access Manag
Posted: December 15, 2011
Ernst & Young
(Secaucus ,NJ)
The Infrastructure Engineer is responsible for completing technical deliverables on projects assigned. Engineers technical deliverables on small or moderate size Infrastructure Engineering or Client projects reporting directly to assigned Project Manager, or staff resource responsible for completing assigned deliverables on large scale global projects reporting directly to the Infrastructure Engineering Technical/Team Lead. Responsible for producing Infrastructure Engineering deliverables meeting or exceeding benchmarks for quality and performance in accordance with the project timeline. Responsible for maintaining effective and consistent communication within you team, within IE peer teams, and the resources in other IT groups. Proactively raise issues to Team Leads when necessary. Provides Level 4 support to Operations in the field of expertise. Essential Functions of the Job: Experienced technical knowledge in specialty area with basic knowledge of complementary infrastructures.

Oracle Identity Management and SSO Consultant
Posted: December 07, 2011
Our client is the world's first full-service semiconductor foundry with a truly global manufacturing and technology footprint. They are looking for a Oracle Identity Management and SSO on a one year contract basis.

Senior Director, Identity Strategy and Platform Ma
Posted: December 01, 2011
(Reston, Virginia )
The Director / Platform Manager will help set the vision and oversee key aspects of the enterprise-wide identity platform, including both custom and COTS identity capabilities. The Director will also seek out and validate opportunities to leverage the platform to create new products and services. We are looking for a Platform Manager to interface with the business units to understand their plans and goals for user interaction, prioritize those goals, and translate them into implementable functionality in the Oracle Identity Management suite.

Identity & Access Management Architect / Sr. Engin
Posted: December 13, 2011
(Farmington Hills Michigan)
Develop identity management system requirements, processes, and design specs based on organizational needs Implement new functionality in IDM system based on organizational requirements Design and implement automated identity governance processes and role management using CA roles and compliance manager

Identity and Access Management Consultant
Posted: December 13, 2011
Aston Carter
(Dublin, Ireland)
My client has an urgent requirement for a Identity & Access Management Consultant for a contract or permanent position in Dublin. The role will involve engineering, implementation and support of my client current Identity and Access Management software, while becoming a subject matter expert to the business.

Identity Management Analyst
Posted: December 13, 2011
(Bartlesville, OK, USA)
Responsible for operational aspects related to the BMC Control-SA (Identity Management) application that is used for provisioning user accounts and synchronizing user passwords.The assignment is in the Identity Management area of Customer Support Services.

Manager Novell Identity & Access Management Specia
Posted: December 12, 2011
(Chicago, IL )
Job Duties: Identify and evaluate business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement Assist in the selection and tailoring of approaches, methods and tools to support service offering or industry projects Actively participate in decision making with engagement management and seek to understand the broader impact of current decisions Generate innovative ideas and challenge the status quo Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services Play substantive/lead role and engagement planning, economics, and billing Assist in retention of professionals Participate in training efforts

Oracle Identity and Access Management Consultant
Posted: December 12, 2011
(ACT, Australia)
Our government client is seeking a qualified and experienced Oracle Identity and Access Management Consultant beginning early January through to the end of the financial year, with extension possibilities.

SAP Identity Management, Senior Consultant
Posted: December 11, 2011
(Atlanta, GA)
The Technology Risk ("TR") service area is comprised of professionals with a broad range of information technology and management consulting skills in the areas of Risk and Compliance, Security and Privacy, and Capital Markets. These professionals perform assessments, remediation, implementation and integration of end-to-end solutions in these three areas. They also deliver advisory services focused on risk and compliance to IT management and senior executives for both external audit and internal audit clients. TR professionals focus on information systems and technology that manage risk and/or drive operational, financial and regulatory compliance processes; as well as solutions that manage the risk associated with information technology itself.

IT Security Architect
Posted: December 12, 2011
(Sacramento, CA)
These are Senior Client Leadership positions including hands-on IT Security Design, IT Security Architecture, and IT Prject Management. You must have 5+ years hands-on design and architecture experience with IT Enterprise Security products, Access Management, Identity Management, preferably in a consulting role. You must have strong background with Enterprise Security products including Tivoli Access Management, Tivoli Identity Management, Tivoli Federated Identity Management, Oracle Security Identity and Access Management, SUN Security Access and Identity Management, CA Security Access and CA Identity Management, PGP, BigFix, Verisys, Fidelis, etc; CISSP preferred.

SAP NetWeaver Identity Management consultant
Posted: December 11, 2011
(Reno, NV)
Systech offers a broad spectrum of SAP professional services in ERP, NetWeaver (BI, EP, XI and xApps), CRM, SCM, Upgrade Solutions and Offshore Services. Systech has successfully delivered SAP solutions to customers of every size, ranging from the Fortune 500, to small and midsize enterprises. Our proven Global Delivery Model has enabled us to be the most sought-after solution partner to execute projects in a cost-effective and time sensitive manner.

Identity Management Application Developer
Posted: December 10, 2011
Rutgers University
(Piscataway, NJ)
Responsible for the analysis, planning, design, development, implementation, and maintenance of Identity Management applications and technologies such as authentication, authorization, Identity provisioning/de-provisioning and directory services Captures requirements, performs analysis, develops strategies, and designs and implements systems from a combination of Open Source, commercial, and locally written products to maintain, extend, and evolve Identity Management services Performs IDM application deployment and maintenance, resolves system outages and client issues Helps to develop technical and policy direction and assure integration with OIT technical groups, the University, and peer institutions Maintains and develops expertise in technologies for authentication, authorization, and directories such as LDAP, CAS, Kerberos, and Shibboleth

Identity and Access Management (IdAM) Engineer
Posted: December 09, 2011
(Washington ,DC)
Identity and Access Management (IdAM) Engineer will be responsible for architecture and program management support for the next phase of the enterprise IdAM deployment within the US Treasury Department. This position will be located in the vicinity of Washington, DC. The IdAM Engineer will provide FIPS 201-1 PIV-II compliance program management oversight and support of tool integration and implementation, card issuance, reporting on usage, and data synchronization. The IdAM Engineer will provide thought leadership and strategy for identity and access management, including translation of policies and business requirements into delivery of IdAM services.

IDAM Access Management Specialist
Posted: December 09, 2011
(Melbourne, Australia)
The primary focus of the System Integrator will be on the integration of distributed systems and applications with the CenITex web access management platform. The candidate should possess expert level skills across the IBM Security product portfolio including: Tivoli Access Manager for e-Business and Tivoli Federated Identity Manager, as well as considerable experience in the Novell Identity and Access Management product suite. It is expected that this person is able to perform tasks independently a majority of the time, with limited assistance from peers, product documentation and vendor support services and in some situations, take leadership and provide mentoring to peers

Identity Management Technology Developer
Posted: December 08, 2011
The University of Memphis
(Memphis, TN)
Provides technical skills to enable the use of identity management related technologies and other new technologies; collaborates with other Information Technology units in ongoing design, development, and deployment of middleware technologies.

Senior Consultant IBM Tivoli Identity & Access Man
Posted: December 08, 2011
Deloitte LLP
(McLean, VA )
Networked companies need a centralized, enterprise wide identity management strategy executed through systems that automate key identity management processes. This is imperative from competitive, cost and risk management perspectives if employees, customers and suppliers, along with other networks and applications, have access to a company's information systems. Our Identity & Access Management (IAM) Framework addresses all aspects of the identity and access management lifecycle. It is a holistic business-focused approach that combines our experience related to processes, control, technology and security, with in-depth vendor software knowledge, to deliver a comprehensive and sustainable identity management solution.

Technical Architect - Access/Identity Management
Posted: December 06, 2011
(London, South East England )
This role provides Strategy, design authority, and general guidance for all elements relating to Internal Control and Operational Risk within IT. There will be a close working relationship with solution and technical architects across IT Trading Functions, to ensure best practices and consistent patterns related to identity/ access management and critical controls are follows. From an architecture perspective, in addition to providing solution and technical architecture in the same space, this role ensures that all designs related to identity and access management are sound and provide enterprise robustness fit for a global trading organization. This role will also ensure that all applications where there are special control considerations for related to regulatory obligations apply the necessary controls.

Manager, Entitlement Management Compliance TIAA-CR
Posted: December 08, 2011
(Charlotte, NC )
The Entitlement Management Compliance Manager is responsible for review and self-test of identity and access management processes/procedures against policies and standards, as well as managing the entitlement review processes. They will plan, test and report on access controls and processes to ensure controls are monitored and updated as appropriate. The Entitlement Management Compliance Manager will assist control and process owners in understanding what controls need to be in place and what access controls need to be implemented to ensure compliance. They will develop and enhance testing strategies and plans to enable management to assess and improve the effectiveness of key access controls. The Entitlement Management Compliance Manager will lead cyclical testing of manual and automated access controls and processes to ensure continued compliance, as well as identify and document gaps, areas of improvement and risks. They will support other audit-related activities including internal and external audits, as well as compliance and risk management. The Entitlement Management Compliance Manager will conduct cyclical reviews of user security entitlements in various systems, databases, authentication platforms and applications. They will manage the entitlement review program to expand the number of systems/applications entitlements included, enhance the entitlement review processes to further automate and improve reviews, and lead the role-mining efforts to move to role-based entitlement reviews. The Entitlement Management Compliance Manager will work with various business, IT, internal and external audit teams and individuals to ensure that entitlement reviews are timely, accurate and any action plans tracked to closure.

Sun Identity Management Developer
Posted: December 07, 2011
(San Francisco Bay Area )
The SUN Identity Management Developer will be challenged to assist in the creation and maintenance highly scalable, available, reliable, and secure security solutions with direction from the Technical Lead.

Identity Management, Active Directory
Posted: December 06, 2011
(Midtown Manhattan)
As an Identity Management Analyst, you will be part of the Identity Management team supporting Identity and Access Management initiatives across the firm. -The scope of the work includes designing enhancements and projects, production support, while working with the firm*s business partners, internal technology teams and a variety of third party vendors. -This position directly supports the Security Administrators that perform user management functions which plays an important role in ensuring that the Identity Management lifecycle (new hires, entitlement modification & review, terminations, etc.) is managed in an efficient manner while adhering to Information Security and Compliance requirements.

Senior IAM ) Architect
Posted: December 02, 2011
(San Francisco, CA )
The Information Security Architecture and Services (ISAS) function is responsible for the development of technical security standards, requirements and implementation of appropriate technology architectures to mitigate risks to McKesson and customer information assets

Identity Access Management (IAM) Security Analyst
Posted: December 03, 2011
TrueBridge Resources
(Mooresville, NC )
Responsibilities: * Design, maintenance and support of the Identity and Access Management domain such as Identity Management, Access Management, Directory Management, Single Sign-On, Federation, and Role Based Access systems. * Analyzing and resolving complex authentication, integration and automation issues. * Provide guidance on integrating the identity management authentication and authorization framework into new and existing applications. * Analyze, develop and implement new identity management solutions based on requirements while ensuring adherence to information security standards, custom development standards and corporate policy. * Participate in defining the roadmap, architecture and process standards for the identity management platform. * Continuously seek to improve the time, cost and risk associated with the automation of user authentication.

Architect / Consultant - Identity and Access Manag
Posted: December 02, 2011
All Identity and Access Management (IAM) Architects should come from either an Oracle or IBM Tivoli technical background and be able to work on both a technical and business front. The right Architect will have experience of translating business requirements into system, scope, solutions and architecture definition. This role offers the right Identity and Access Management (IAM) Architects the opportunity to further push their career forward and work on large scale projects.

Identity Management Engineer
Posted: December 02, 2011
Fifth Third Bank
(Cincinnati, Ohio)
Primary function will be sustained engineering, maintenance, and operations of Identity Management infrastructure utilized by the Enterprise. Individual will be responsible for working with application stakeholders to design and implement solutions related to integrations into said Identity Management systems. Individual will also be responsible for various aspects of infrastructure management including implementation, maintenance, performance monitoring and capacity planning, troubleshooting, support, etc. While this role is primarily technical, this role requires a great deal of communication with users and technical resources at all levels. Candidate should have strong communication skills (written and verbal) and be comfortable working with other groups within the organization.

Identity & Access Management/Directory Services
Posted: December 02, 2011
Best Buy US Corporate
(Richfield, MN)
The IAM/DS Consultant will be focused on assessing, designing, and implementing technology in support of Best Buy's business strategy. In addition, this role will partner with technology management, enterprise architecture, and GBS clients to understand business, industry, and technology variables to set Best Buy's Identity direction. The IAM/DS Consultant will serve on a team of technology professionals to cooperatively design and enhance IAM architecture, engineering and operations to create robust technology solutions that deliver real business value to Best Buy.

Advisory Services Manager - IT Risk Transformation
Posted: December 01, 2011
Ernst & Young Advisory Services
(San Francisco, CA)
Our IT Risk Transformation practice focuses on enterprise IT application assessment, Governance, Risk and Compliance technology assessment, IT Application and Tool Implementation. We deliver valuable insights and enable better business decisions through improved quality of information.Team members deliver world-class information technology advice as part of our broader risk and business improvement services. We provide services such as financial audit IT integration, third party reporting, IT Risk Advisory, information management & analysis and information security.

Lead Identity Management Developer
Posted: December 01, 2011
(New York, NY)
Develop the application security platform, assist application development teams with integration, and perform onboarding tasks on an Identity Management project. The consultant will join a premier team delivering authentication, authorization, and federation solutions to business units that host external web sites used by individual and corporate customers. They need someone who understands the large enterprise picture and how the development affects the infrastructure of the environment.

Identity and Access Management Technologist
Posted: December 01, 2011
(Wellington, NZ)
Essential: Solid senior programming background in Java (ideal) or .NET; Proven experience in, as well as a specific interest in, Identity and Access Management; Self-starting and self-organised approach; Excellent communication skills.

SQL Identity Management Solution Specialist
Posted: November 30, 2011
Pyramid Consulting
(Raritan, NJ )
Perform operations activities in implementation of a global SQL Identity Management solution. This includes: Hands-on in developing and documenting the migration of MS SQL databases to AD infrastructure for Identity management. Reviewing & providing the feedback on checklists, work instructions and instruction guides from operational prospective Integration and System testing of AD implementation including creation of AD groups Execute UAT testing, , capture details for developing, reviewing required documentation Involved in database operations activities including participation in hyper care testing and implementation of AD groups, role mining and role lifecycle management Assist the migration team to resolve any and all issues related to migration activities. Involve in knowledge transfer of operations L1/L2

Identity Management Analyst
Posted: November 28, 2011
Responsible for operational aspects related to the BMC Control-SA (Identity Management) application that is used for provisioning user accounts and synchronizing user passwords. The assignment is in the Identity Management area of Customer Support Services.

If you have an upcoming position opening, us a note and we'll add it to the list.

© Copyright 2003 - 2009, The Virtual Quill