We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

IAM & PAM Engineer

Altice USA
United States, Texas, Plano
Nov 07, 2024
Optimum

Are you looking to Optimize your life? Start your exciting path to a rewarding career today!

We are Optimum, a leader in the fast-paced world of connectivity, and we're on the hunt for enthusiastic professionals to join our team! We understand that connectivity isn't just a luxury anymore - it's a necessity that empowers lives, fuels businesses, and drives innovation. A career at Optimum means you'll be enabling progress and enhancing lives by providing reliable, high-speed connectivity solutions that keep the world connected. We owe our success to our amazing product, commitment to our people and the connections we make in every community.

If you are resourceful, collaborative, team-oriented and passionate about delivering consistent excellence, Optimum is the Company for you!

We areOptimum!

Job Summary

The IAM & PAM Engineer will be responsible for ensuring that Altice USA's Identity & Access Management and Privileged Access Management platform is implemented, designed, and maintained to ensure that all applications being used within the company are on-boarded for access entitlements, provisioning and de-provisioning of users. Candidate must be familiar in integrating and managing privileged accounts, ensuring security compliance, and providing technical support for CyberArk or similar related technologies. Candidate must be well versed with Identity federation principles as the person will have the responsibility to set the standard for the firm in terms of identity & access management as well as privilege access management. Candidate must also have role-based access control (RBAC) experience in relation to design, implementation, and remediation. This position requires participation in technical research and development to enable continuing innovation for Privilege Access Management and Information Risk management. CyberArk Experience Preferred.

Responsibilities
  • Provides information security subject matter expertise in support of projects sponsored by business units and other EIT departments.
  • Install and configure CyberArk PAS solutions or related technology, including the Enterprise Password Vault (EPV), Central Policy Manager (CPM), Password Vault Web Access (PVWA), Privileged Session Manager (PSM), and Privileged Session Manager Proxy (PSMP), Endpoint Privilege Access Management (EPAM), Third Party Privilege Access Management (VPAM).
  • Administer and engineer CyberArk for integrating privileged accounts across on-premises and cloud environments, including Azure.
  • Collaborate with cross-functional teams to integrate CyberArk solutions into both on-premises and cloud-based systems.
  • Integration of Automated Password rotation on Service Accounts, and other Highly Privileged accounts.
  • Conduct regular assessments and audits to ensure the security and compliance of privileged accounts and access across all environments.
  • Assist in the documentation of processes, procedures, and best practices for CyberArk administration and privileged access management.
  • Stay up-to-date on the latest developments in CyberArk technologies and cybersecurity best practices through self-study and training opportunities.
  • Ensures that system implementations conform to established company security standards and/or industry best practices.
  • Participates in the budget process by specifying Information Security technical, resource and personnel requirements for capital projects.
  • Conducts laboratory and pilot evaluations of security technologies.
  • Provides information security consulting services to business units and other departments.
  • Maintains support relationships with various vendors and manufacturers.
  • Develops and maintains minimum security baseline configurations for various handheld, workstation and server operating systems.
  • Processes Service Desk tickets assigned to the Engineering team.Responsible for problem resolution.
  • Develops documentation including operations manuals, runbooks, procedures and problem resolutions.

#LI-LP1

Qualifications
  • BS Degree in IT Security, Cybersecurity, Computer Science or equivalent work experience
  • Minimum 3-5 years of experience in Information Security with focus on Identity and Access Management with Privileged Access solution components such as CyberArk - EPV, CPM, PVWA, PSM, PSMP, EPAM, and VPAM
  • Deep understanding of RBAC (Role Based Access Control), Single Sign On (SSO), and Privileged Account Management (PAM), Identity and Access Management (IAM)
  • Identity Access and Governance management - Preferably skills with SailPoint, Okta, and a Privilege Access Management solution such as CyberArk
  • Strong Analytical background
  • Understanding of Active Directory domains, LDAP directories, Oracle Identity, Unix Identity
  • Bachelor's degree in Computer Science or Information Systems or equivalent experience required
  • Strong understanding of cloud computing concepts including experience with Microsoft Azure, Amazon Web Services, Google Cloud Platform
  • Knowledge of scripting (Unix/Linux shell, Perl and Windows) or programming (Visual Basic and MS Access)
  • Expert knowledge of Microsoft Active Directory, Azure Active Directory
  • Advanced level knowledge in architecture and implementation of identity and access management solutions
  • Extensive experience in design and troubleshooting of user provisioning and deprovisioning workflows, including automation of access and access removal to various applications and/or authorities
  • Demonstrated knowledge of identity, authentication, security, privacy, and compliance and how they factor into cloud and hybrid solutions
  • Strong working knowledge of network architecture and standards for large enterprise
  • Knowledge of compliance standards and practices such as PCI DSS, Sarbanes Oxley, and Department of Justice National Security Agreement
  • Ability to assemble project requirements and contribute to a security design implementation from inception to completion

At Optimum, we're fueled by our four core pillars: Taking Ownership, Upholding Transparency, Creating Community, and Demonstrating Expertise. Our commitment to empowering employees to take responsibility and embrace proactive problem-solving underpins Taking Ownership. Upholding Transparency is at the core of our culture, with open and honest communication fostering trust among our dedicated team and loyal customers. Creating Community is more than a goal; it's our daily commitment to fostering an environment of collaboration, innovation, and positivity. Demonstrating expertise is a promise we uphold through continuous learning and engagement with our customers to consistently deliver top-quality products and services. These pillars not only shape our culture but define Optimum as a place of excellence, trustworthiness, and thriving community, and we invite you to be a part of our journey.

If you have the drive to succeed and are ready to embark on a thrilling career, seize this opportunity today, and join our winning team, so together, we'll shape the future of connectivity.

All job descriptions and required skills, qualifications and responsibilities for a particular position are subject to modification by the Company from time to time, in the Company's discretion based on business necessity.

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, national origin, religion, age, disability, sex, sexual orientation, gender identity or protected veteran status, or any other basis protected by applicable federal, state, or local law. The Company provides reasonable accommodations upon request in accordance with applicable requirements.

Optimum collects personal information about its applicants for employment that may include personal identifiers, professional or employment related information, photos, education information and/or protected classifications under federal and state law. This information is collected for employment purposes, including identification, work authorization, FCRA-compliant background screening, human resource administration and compliance with federal, state, and local law.

Applicants for employment with the Company will never be asked to provide money (even if reimbursable) as part of the job application or hiring process. Please review our Fraud FAQ for further details.

Applied = 0

(web-5584d87848-7ccxh)