CyberSec Consulting

1 month ago


Remote, IN CybersecIT Full time

Job Description :


Responsibility :

- Responsible for End-End implementation of SailPoint Identity IQ Lifecycle Manager and Compliance Manager

- Design, Implement and maintain provisioning and access workflow processes

- Design, Implement and maintain provisioning and Access Certifications

- Implement connector configuration, Implement custom rules, workflow configuration and development, and third-party system integration.

- Design and deploy custom forms and approval workflows for access request and provisioning in SailPoint IIQ

- Provide SailPoint-related troubleshooting services as part of project or post-production support activities

- Prepare documentation for technical controls and processes associated with SailPoint

- Create documentation of process, guidelines, standards, technical specifications, as well as drawing network & system architecture diagrams

- Prepare test cases, test plans, as well as perform unit and peer testing.

- A minimum of a Bachelor of Science degree in Computer Science or related field is required.

- 8 years of professional experience in the domain of Identity and Access Management

- 5+ years of experience with SailPoint IdentityIQ including both lifecycle and compliance modules

- Experience in SailPoint Identity IQ and Sailpoint File Access Manager technologies

- Experience in implementing / customizing identity lifecycle management processes

- Experience in customizing all types of SailPoint Identity IQ Access Certification process.

- Experience in customizing Sailpoint Identity IQ Access Requests & Approval workflows

- Should have 5 years of experience on Java, Web services, XML and Database query and reporting

- Experience in integrating variety of technologies such as multi-tiered applications, databases, and LDAP and directory services with Sailpoint Identity IQ.

- Should have worked on all Types of Access Certification process, Application onboarding, Policy Violation, Provisioning with Direct connector and through Provisioning Rule.

- Strong information security experience

(ref:hirist.tech)