-
›
- Careers ›
- Careers in India ›
-
Specialist
Job Description
Specialist
Job Summary
-
Location: Chennai
-
Project role: Specialist
-
Qualification: B-Tech
-
Experience: 2.5-5 Years
-
Skills: Identity Management Operations
-
No. of positions: 1
Job description:
Work Experience: 3+
Technology Stack: Externalized Authorization Management Solutions (Axiomatics/PlainID/etc.)
3+ years of experience in IAM implementation or L3 level of support in Identity and Access Management
Hands on installation and configuration of Externalized Authorization Management Solutions (Axiomatics/PlainID/etc.)
Hands on installation and configuration of Externalized Authorization Solution.
Hands-on experience on:
Complete process and flows of Open ID connect, SCIM, XACML SAML, OAuth and UMA2.
Externalized Authorization Management solution architecture design hands-on
Hands on experience with integrating application with Externalized Authorization Management solution
Lead the implementation for Externalized Authorization Management solution
Troubleshooting & Debugging problems
Experience in technologies such as LDAP, SSL, RDBMS and Linux
Ability to review existing deployment architecture and document-and-propose target deployment architecture
Management of entitlements, their attributes, relationships, and hierarchies
Capturing the explicit and rule-based assignment of entitlements to users
Runtime-configurable workflows to manage the lifecycle associated with entitlements and rule-based assignments
Strong analytical, problem solving & troubleshooting skills
Understanding and hands-on on REST APIs
- To clearly understand the client's cybersecurity environment and respective product.
- To monitor, configure, and troubleshoot cybersecurity issues and related monitoring tools
- To analyse and validate cybersecurity incidents in-detail and help the L3 team with RCAordata or logs collection
- To enable knowledge transferortrainings through creationor maintenance of configuration documents, test plans, operational manuals and provide operational training to L1 team.
- To analyse and fine-tune cybersecurity policies, participate in cybersecurity review calls pertaining to change requests and recommendations on cybersecurity policy changes.
- To implement changes, monitor security device performance and implements performance tuning when necessary.
- To prepare analyses and reports to highlight the project progressorchallenges and ensure quality and accuracy to the client