A daily email of jobs matching your skills and preferences.Sign Up 👋
RSA G&L Architect
Remote, Remote Information Technology
Duration: 12 months
Responsibilities/Job Duties/Job Description/Qualifications:
Resource must have experience installing RSA Identity Governance Lifecycle (IGL) product line in an environment and to be able to function as the technical lead within our project for this implementation.
There will be interfacing with Active directory (On-premise & Azure) , HR System(s), Flat files, some applications., etc.
In our implementation of RSA only the IGL component will be used and will be the Master Identity Management System.
They should be capable of architecting and implementing the system and be able to accurately document the system including documents for an operational handoff post implementation and into production in multiple co-location and cloud environments.
Demonstrate multiple successful implementations of an IAM project, preferably a new design and install, for large enterprise organizations.
Provide Technical Expertise & Leadership as it pertains to implementation of RSA Identity Management/Access Management & IT Governance
Act as a IDM/IAM Subject Matter Expert (architecture, configuration, development, maintenance, incident resolution, and root cause analysis frameworks for RSA)
Frequent interaction with business users, vendors, leadership, technical & non-technical personnel to determine & fully implement complex RSA technical solution
Demonstrate excellent communication skills including verbal and written work product and designs
Identify areas in need of process enhancement/improvement and assist with implementing necessary changes
Lead efforts to develop/enhance & enforce best practices/processes/procedures for RSA IAM complex technologies
Background in Opensource DB is a MUST
The RSA IGL subject matter expert shall be responsible for the following:
Solution Required Documentation
HLD --High Level Design (HLD)
LLD -- Low Level Design (LLD)
RSA IGL should be configured with the following components:
Access Compliance Manager (ACM)
Data Access Governance (DAG) with StealthAudit
Access Request (ARM)
Role Manager (BRM) and modeling
Access Fulfillment Express (AFX) (Provisioning Module)
Integration with Workday
Integration with Azure AD and Azure SSO
Integration with Windows AD
Integration with Service Now
Integration with PKI
Integration with Radius
Integration with Applications (Web, SaaS, Client/Server, Standalone, DB, etc.)
Workflow creation and implementation
Active Directory OU/Group creation and advisory
Access Management Platform solution includes the following features:
Advanced authentication schemes
User entitlement and authorization functionality
Creation of Global Identity Repository (GIR):
Database storage of identity data from multiple sources
API integration for information query
Best practice information security design and implementation
Integration to RSA IGL and HR systems
Creation of Documentation that will be stored on the website and in SharePoint
A high level Project plan will be maintained so everyone can see the current status
Resource time will also be tracked in MS Project and Timex under the appropriate task (internal project systems)
Once the governance structure has been finalized, determinations will be made on frequency of meetings
Actions can be taken without meetings and by coordination via email
Agenda and meeting materials will be provided prior to the meetings at a frequency to be determined
Issues that arise during the project that require immediate attention can be sent out via email and may require a timely response. If the team feels a meeting is necessary to discuss the issue, a meeting will be scheduled by the project manager
Action Items, Risks, and Issues will be tracked via an Excel Spreadsheet and reviewed at project meetings
Change Management Once the project charter is approved and the project planning is underway, all changes to project scope and any significant changes to project budget and schedule must go through the project managers, documented and discussed with the project team. The exact Change Management process will be further defined and shared.
Impact and Dependencies Impacts:
Business processes for generating and administering identities
Federation Systems and services (SAML, OAuth, WSFed, etc.)
ETL based services provided by Lilly for cSAD
Active Directory for storing identities
Workday for creation of Identities
Business processes for creating and tracking affiliations
Decisions being made regarding changing or developing business processes
Resources will be available from all units necessary
Governance will be in place for making business process decisions
Business processes will need to change
A new window will open to the job source site.
Growing a career that's right for you is a life-changer, but it's undeniable that the job search gets tougher every year. With automated hiring processes, resume filters and questionable interview practices, finding a job that a tech skillset has become seriously challenging.
That's where we step in. Careeriscope can help lighten the stress load by making your search a bit easier. We help you find matches based on the job search criteria you set, then send a summary of the results in a daily email sent every morning for review.