2 to 4 years of experience in Identity and Access Management (IAM)., Experience in development, implementation, or architecture of information systems., Practical knowledge of IAM operations and monitoring tools., Familiarity with cloud services like AWS and IAM tools such as SailPoint, ForgeRock, CyberArk..
Key responsibilities:
Monitor IAM job schedules and track connector health.
Respond to system alerts and acknowledge incidents by creating tickets.
Perform initial analysis of user and entitlement issues.
Escalate system issues to engineering teams as needed.
Report this Job
Help us maintain the quality of our job listings. If you find any issues
with this job post, please let us know. Select the reason you're reporting
this job:
SDG is a leading global provider of technology, consulting, and managed services that enable organizations to confidently execute cybersecurity, identity, and risk management solutions to mitigate risk, protect assets, and grow securely.Whether you need strategic advice, design, implementation, managed support or GRC, SDG is focused on:- Cloud Security- Cybersecurity and Risk Management- GRC as a Services- Identity and Access Management- Managed Security ServicesWith more than 30 years of experience partnering with global brands on complex business and IT challenges, SDG is the perfect choice for enterprises in need of strategic support and technology solutions. SDG is passionate about finding the right solution to help your organization compete effectively.For more information, please visit http://www.sdgc.com
Respond to email alerts, system dashboards, or monitoring tools
Acknowledge incidents and create tickets.
Perform initial analysis (e.g., check user status, entitlement assignments).
Escalate to engineering team for system issues, integration errors, or unexpected behavior.
Working knowledge and/or experience with tools such as SailPoint (Identity Security Cloud), ForgeRock, CyberArk, and OutSystems.
Experience with IT Service Management (ITSM) tools such as ServiceNow and Jira.
Understanding and familiarity with Operating Systems (Windows, Unix, Linux).
Required experience in Amazon Web Services (AWS), including services such as EC2, RDS, S3, Route 53, SES, VPC, Security Hub, WAF, AWS ALB or NLB, Secrets Manager, CloudWatch, Lambda and AWS Glue.
A Bachelor’s degree in Computer Science, Cyber Security, Information Security, or a related field is highly recommended
Requirements
2 to 4 years of industry experience in Identity and Access Management (IAM).
2 to 4 years of experience in development, implementation, or in architecture information systems.
Practical experience in day-to-day IAM operations.
Respond to email alerts, system dashboards, or monitoring tools
Acknowledge incidents and create tickets.
Perform initial analysis (e.g., check user status, entitlement assignments).
Escalate to engineering team for system issues, integration errors, or unexpected behavior.
Working knowledge and/or experience with tools such as SailPoint (Identity Security Cloud), ForgeRock, CyberArk, and OutSystems.
Experience with IT Service Management (ITSM) tools such as ServiceNow and Jira.
Understanding and familiarity with Operating Systems (Windows, Unix, Linux).
Required experience in Amazon Web Services (AWS), including services such as EC2, RDS, S3, Route 53, SES, VPC, Security Hub, WAF, AWS ALB or NLB, Secrets Manager, CloudWatch, Lambda and AWS Glue.
A Bachelor’s degree in Computer Science, Cyber Security, Information Security, or a related field is highly recommended
Required profile
Experience
Spoken language(s):
English
Check out the description to know which languages are mandatory.