Identity and access management and security
HorizonTechnologiesInc
Posted: May 12, 2016
Interested in this position?
Create a free account to apply with AI-powered matching
Quick Summary
Provide information security support to client’s ICAM work group by specifying security requirements and recommend implementation options that are in line with the WBG’s information security and technology standards.
Required Skills
Job Description
Horizon Technologies is one of the fast growing, CA based organization specializing in IT consulting and business services for mid to large size organizations. Our team has excellent track record of providing excellent career Counseling and Placements in the shortest time. Over the last seven years, our client base of Fortune 100 companies has expanded dramatically
• Provide information security support to client’s ICAM work group by specifying security requirements and recommend implementation options that are in line with the WBG’s information security and technology standards.
• Work with project and development teams of new business solution to define information security requirements that are in line with the enterprise information security architecture.
• Maintain an up-to-date understanding of emerging trends in identity and access management, especially in the area of authorization and identity lifecycle management; apply new techniques and trends to design a centralized authorization framework, taking into consideration the WBG business and IT environment.
• Interface with other ITS teams including, but not limited to, Certification and Accreditation, Security Engineering, Incident Response, and Event Management, to gather identified information security risks; develop risk profiles for enterprise-wide business applications and identify areas where existing security architecture requires change or development.
• Evaluate emerging authentication and authorization technologies for cloud and mobile applications. Test and integrate new IAM solutions with business applications.
• Master’s degree in Computer Science or Information Systems with at least 5 years of relevant experience. (BS/BA is minimum education requirement with at least 7 years of relevant experience).
• Preferably experience as an Information Security Professional designing secure solutions in an environment comprising of financial and trading systems, systems handling strictly confidential, personnel and proprietary information.