Área de la Empresa | Tecnologias de Informacion |
Cargo Solicitado | Otros empleos |
Puestos Vacantes | 1 |
Tipo de Contratación | Tiempo completo |
Nivel de Experiencia | Sin experiencia |
Salario máximo (USD) | |
Salario minimo (USD) | |
Vehículo | Indiferente |
País | Costa Rica |
Departamento | Otro |
Introduction
At IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.
Your Role and Responsibilities
The Identity Access Management Specialist (IAM) is responsible for manual user lifecycle management for in-scope systems using multi-tier request processing and fulfillment model, management of in-scope RACF profiles and policies, administration, and ongoing enhancement of in-scope authentication services, including technologies such as CyberArk, Saviynt, OKTA or others. IAM Specialists are also responsible for the administration of access roles and policies, execution of re-certification campaigns, and management of Privileged Access Management accounts.
Required Technical and Professional Expertise
+2 years of hands-on experience working with CyberArk technologies.
- Experience troubleshooting CyberArk issues and providing recommendations to tune the infrastructure.
- Ability to interpret implementation roadmaps, and complex technical documents.
- Experience managing and implementing multiple CyberArk modules and components.
- Strong understanding of IAM concepts and technologies.
- Experience working with authentication services, user lifecycle, and policy management.
- Excellent communication and interpersonal skills
- Strong understanding of cybersecurity concepts and IT Security.
- English fluency is required for this role.
Preferred Technical and Professional Expertise
CyberArk Defender or higher (Sentry, CDE) certification.
- CompTIA Security+ or equivalent certifications (CySA+, SSCP, etc.)
- Experience doing implementations and deployments in large environments.
Informática | Sistemas Requerido |
Universidad Completa | Graduado |
Por favor, ingresa tu correo electrónico
Por favor, ingresa un correo electrónico válido