• Identity and Access Administrator

    Job Locations US-FL-HOLLYWOOD
    Job ID
    2018-5240
    # of Openings
    1
    Department
    Information Technology
  • Overview

    Seminole Hard Rock Support Services provides Information Technology Services for Seminole Gaming and Hard Rock International and their subsidiaries and/or franchisees. 

     

    The Identity and Access Management area exists to reduce risk, enhance compliance adherence, improve the end user experience, reduce staff on boarding and transference time and automate manual processes in relation to User Access.

    The Identity and Access Management Administrator role ensures the ongoing protection of systems, networks, physical assets and data of the company and its customers. The position will be responsible for assisting in the planning, designing and implementing Identity/Access Management (IAM) solutions at an enterprise and application level for our organization. The incumbent will be responsible for working cross functionally throughout the organization; monitor the post-implementation service delivery, take actions and steps to verify and validate that services are being delivered in support of SGA’s Identity Management Program and Operations. This will require someone with considerable experience within the Identity Management Profession.

    Responsibilities

    The primary duties and responsibilities of the Identity & Access Administrator follow:

     

    • Support Identity & Access Manager in execution of IAM strategy, roadmap and vision definition
    • Support IAM Audit, Operational Risk and Compliance adherence
    • Execute IAM project delivery consisting of multiple work streams, phases or releases
    • Assist in development of documentation, subject training, and other knowledge material on IAM
    • Assist in development of strategies around IAM security for web and mobile applications
    • Develop and document detailed security requirements for deployment of applications and network infrastructure components and participate in development of security requirements for new and emerging IAM technologies
    • Cultivate and maintain relationships with key stakeholders at varying organizational levels
    • Build working relationships with IAM vendor product management, development and engineering teams; partner closely with enterprise architects, project managers, and other technical teams as necessary to ensure a consistent approach to account lifecycle management
    • Identifies, assesses and solves complex business problems
    • Has some latitude in decision-making and acts independently to determine methods and procedures
    • Maintain regulatory awareness and compliance and ensure adherence to risk-related policies and best practices
    • Demonstrate and embed the behaviors and competencies that create a risk management mind-set in the organization
    • Work as part of a security incident response team as required
    • Perform other security team relevant duties and responsibilities as assigned

    Qualifications

    • Bachelor’s Degree preferred in Computer Sciences, Information Technology, Information Security or other related field or at least 3-5 years of experience in primary IAM duties
    • Information Security and Governance certifications including at least one of the following - CISSP, CISA, CRISC, GSEC, COBIT5 or ITIL strongly desired
    • Previous engagement in the telecommunications industry is desirable but not essential
    • Experience with Security & Risk/Identity, Access Management and Technology Security Controls
    • Experience of Identity Governance & Administration
    • Experience in Access Management & Federation
    • Experience in design of Microsoft Active Directory permissions and role-based security models
    • Experience facilitating business process design as it relates to managing identities and access privileges
    • Experience implementing packaged or custom IAM solutions
    • Have a strong understanding of federated identity and web services security concepts such as SAML, WS-Federation; on-boarding and off-boarding; privilege accumulation; role based access control (RBAC); Authentication, Authorization, and Accounting (AAA); and experience with IAM tools – such as Novell NetIQ, Courion, Thycotic, or similar tools

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed