Analyst – Identity & Access Management (REMOTE) – Nigeria

Analyst – Identity & Access Management (REMOTE) – Nigeria

 

Benefits

Pulled from the full set of working responsibilities

401(k)

Parental leave

Full set of working responsibilities

Interfacing Individuals. Joining the World. There will never be been a seriously intriguing chance to join Joined Carriers! As a worldwide organization that works in many areas all over the planet — with a huge number of clients and a huge number of representatives — we have a novel obligation to elevate and give open doors in the spots where we work, live and fly.

We’re on a way toward turning into the best carrier throughout the entire existence of flight. Join our Online protection and Advanced Hazard (CDR) group to assist us with likewise turning into the main digital safe aircraft in the business. Joined’s CDR group is entrusted with keeping our clients’ and representatives’ data no problem at all. Our essential mission is to install network protection into the DNA of Joined Aircrafts by lessening business risk through execution of solid network protection best practices.

Joined offers a serious advantages bundle pointed toward keeping you cheerful, solid and very much voyaged. From representative run “Business Asset Gathering” people group to top notch benefits like parental leave, 401k and honors like space accessible travel, Joined is really a unique work environment. Might it be said that you are prepared to venture to the far corners of the planet and assist us with guarding our aircraft digital? Apply today!

 

Key Liabilities:

The Expert – Character and Access The executives (IAM) assumes a basic part in dissecting, reinforcing, and getting the organization’s IAM frameworks and in general security pose. This position centers around proactive investigation, cooperation across groups, and supporting consistence endeavors to persistently further develop the association’s security scene.

The Investigator – Personality and Access The executives (IAM) will perform examination of IAM frameworks to distinguish weaknesses, failures, and regions for development as well as proactively prescribe and carry out procedures to improve security, smooth out processes, and guarantee ideal framework usefulness. They will work intimately with advancement groups, IT security specialists, and different associates to incorporate secure personality arrangements all through the item lifecycle and cultivate open correspondence and cooperation to guarantee fruitful IAM execution and reception across the association

The job likewise effectively takes part in consistence endeavors by guaranteeing IAM frameworks comply with significant guidelines and inward strategies, while additionally leading normal reviews and appraisals to recognize and address potential consistence holes. The ideal examiner will constantly keep up to date with advancing IAM best practices, industry principles, and arising dangers. Adjust and carry out new innovations and cycles to keep a hearty and secure IAM climate.

Helps with offering help for the execution and organization of IAM stages
Offers help in answering break/fix demands observing the climate, supporting Advanced Innovation in change the executives processes for improvement, QA, and creation conditions

Answer Level 1 tickets including bugs, blackouts, and new component demands
Guarantee IAM arrangements stick to administrative, consistence, and inside prerequisites
Aid the support of IAM strategies, principles, and methodology
Give reports as mentioned to consistence

Work with Digital Safeguard and different gatherings depending on the situation
Guarantee IAM security is lined up with the general security procedure to lessen hazard to the association
Work together with advancement groups and other IAM administration buyers
Give direction on the execution and utilization of IAM abilities in big business frameworks
Team up with other IAM colleagues looking for direction on IAM related matters and adding to framework support

Joined values different encounters, viewpoints, and we support every individual who meets the base capabilities to apply. While having the “ideal” capabilities make for a more grounded competitor, we empower candidates who may not feel they really take a look at Those crates! We are continuously searching for people who will bring a new thing to the table!

 

Capabilities

What’s expected to succeed (Least Capabilities):
Four year college education and three years of work insight, or in lieu of a Four year certification, 6-9 years of related work experience will be acknowledged
3+ long stretches of related insight
A comprehension of Big business or Client Personality and Access The board in a portion of the accompanying regions
Single Sign-On, Multi-Production line Validations (MFA), and Confirmation, Restricted admittance The executives (PAM), Personality Administration and Organization ideas
A comprehension of character Conventions and innovations like OpenID Interface (OIDC,) OAuth, SAML, Promotion Took care of, Programming interface Entryways, SCIM, and stages, for example, Ping Personality, Okta, MS Purplish blue, and ForgeRock
Experience with present day programming lifecycle advancement and computerized cloud foundation sending
Comprehension of arrangements that reflect framework security targets
Capacity to decide how a security framework functions (counting its strength and steadfastness abilities) and how changes in conditions, tasks, or the climate will influence these results

Experience with no less than one of these area explicit apparatuses:

EIAM-Delinea/Thycotic, CyberArk, Couple, Prophet Access Chief, Sail Point, Saviynt
Should be lawfully approved to work in the US for any business without sponsorship
Fruitful finishing of interview expected to meet work capability
Solid, reliable participation is a fundamental capability of the position

What will assist you with impelling from the pack (Favored Capabilities):

STEM, Network protection, Chance Administration, Software engineering
CISA, CISM, CISSP
4+ long stretches of related insight
Information on hierarchical principles and strategies (ISO, NIST)
Information on consistence guidelines (SOX, PCI, FAA, GDRP, PII)

 

 

Leave a Comment