Horizontal Talent · 16 hours ago
IAM Security Engineer (Okta OIG/PAM Specialist)
Horizontal Talent is seeking an IAM Security Engineer specializing in Identity Governance & Administration and Privileged Access Management. This role involves managing identity lifecycle processes, developing security protocols, and collaborating with teams to ensure secure access controls.
ConsultingHuman ResourcesProfessional ServicesBusiness DevelopmentStaffing Agency
Responsibilities
Manage identity lifecycle processes with advanced governance tools for streamlined efficiency
Develop and implement security protocols to ensure robust management of privileged accounts
Collaborate with cross-functional teams to maintain secure and compliant access controls
Create automated workflows to facilitate seamless user access provisioning and deprovisioning
Enforce identity governance policies to support organizational security structures
Integrate access management solutions across various organizational platforms
Qualification
Required
Manage identity lifecycle processes with advanced governance tools for streamlined efficiency
Develop and implement security protocols to ensure robust management of privileged accounts
Collaborate with cross-functional teams to maintain secure and compliant access controls
Create automated workflows to facilitate seamless user access provisioning and deprovisioning
Enforce identity governance policies to support organizational security structures
Integrate access management solutions across various organizational platforms
Comprehensive knowledge in Identity Governance and Administration (IGA)
Strong understanding and application of Privileged Access Management (PAM)
Proficient in integrating identity solutions with HRIS and directory services
Adept at developing and overseeing complex security policies and access controls
Preferred
Experience with Okta solutions for effective identity and access management
Familiarity with compliance standards and access management auditing processes
Knowledgeable in session monitoring and security strategies for privileged accounts