IntroductionAt IBM, work is more than a job - it's a calling: To build. To design. To code. To consult. To think along with clients and sell. To make markets. To invent. To collaborate. Not just to do something better, but to attempt things you've never thought possible. Are you ready to lead in this new era of technology and solve some of the world's most challenging problems? If so, lets talk.
Your Role and ResponsibilitiesAs Security Delivery Analyst, you are responsible for Identity and access management (IAM) that covers products, processes, and policies used to manage user identities and regulate user access within an organization.If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. Responsibilities
- Work with implementation partner to see project on track
- Day-to-day PIM Operations, monitor System Health ,Troubleshoot and resolve PAM issues - user login, device access, password rotation etc
- Generate PAM reports per customer requirement
- PAM Software Patching & Upgrade
- Device and user on-boarding, Policy configuration, Group/Roles Management
- Co-ordinate with OEM for L3/product level issues
- Provide required reports to management / client and handle the project as well as BAU operations
- Ensure high level of systems security compliance and ability to coordinate with and act as an authority to resolve incidents by working with other information security specialists to correlate threat assessment data
Required Technical and Professional Expertise- 3+ years of experience in Identity and Access Management / Privilege Access Management.
- Experience in Privileged Access Management - such as RCON/CyberArk/Beyond-Trust
- Exposure of LDAP/AD, SSH, RDP, HTTP
- Experience in device integration, user-onboarding, password management on PAM
- Basic understanding of Database and Queries
- Proven troubleshooting skills
- Working knowledge of industry standard risk, governance and security standard methodologies
- Proficient in incident response processes (detection, triage, incident analysis, remediation and reporting)
Preferred Technical and Professional Expertise- One or more security certifications CEH, Security+, GSEC, GCIH, etc
- You love collaborative environments that use agile methodologies to encourage creative design thinking and find innovative ways to develop with cutting edge technologies
- Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work
- Intuitive individual with an ability to manage change and proven time management
- Proven interpersonal skills while contributing to team effort by accomplishing related results as needed
- Up-to-date technical knowledge by attending educational workshops, reviewing publications