Full-Time

Identity and Access Management Security

AG Technologies

AG Technologies

No salary listed

Washington, DC, USA

In Person

Category
IT & Security (1)
Required Skills
Risk Management
Requirements
  • Master’s degree in Computer Science or Information Systems with at least 5 years of relevant experience.
  • BS/BA is minimum education requirement with at least 7 years of relevant experience.
Responsibilities
  • Provide information security support to client’s ICAM work group by specifying security requirements and recommend implementation options that are in line with the WBG’s information security and technology standards.
  • Work with project and development teams of new business solution to define information security requirements that are in line with the enterprise information security architecture.
  • Maintain an up-to-date understanding of emerging trends in identity and access management, especially in the area of authorization and identity lifecycle management; apply new techniques and trends to design a centralized authorization framework, taking into consideration the WBG business and IT environment.
  • Interface with other ITS teams including, but not limited to, Certification and Accreditation, Security Engineering, Incident Response, and Event Management, to gather identified information security risks; develop risk profiles for enterprise-wide business applications and identify areas where existing security architecture requires change or development.
  • Evaluate emerging authentication and authorization technologies for cloud and mobile applications. Test and integrate new IAM solutions with business applications.
  • Document security architecture design review results and follow up on the implementation of recommended controls.
  • Peer-review security architecture design artifacts produced by colleagues and provide feedback.
Desired Qualifications
  • Preferably experience as an Information Security Professional designing secure solutions in an environment comprising of financial and trading systems, systems handling strictly confidential, personnel and proprietary information.

Company Size

N/A

Company Stage

N/A

Total Funding

N/A

Headquarters

N/A

Founded

N/A