Talent.com
ISAM – IBM Security Access Manager – IBM Security Access Manager

ISAM – IBM Security Access Manager – IBM Security Access Manager

RaiseOntario
30+ days ago
Job description

Job Description

Position : ISAM - IBM Security Access Manager - IBM Security Access Manager

Location : Remote, EST Time Zone (Candidates can be located anywhere in Canada)

Duration : 18 months

We at Raise are hiring an ISAM - IBM Security Access Manager - IBM Security Access Manager for one of our top clients. After establishing themselves as an industry leader, they’re now expanding their team to meet rising demand. We’re hiring right now; if you’re interested, apply below for your chance to join a great place to work.

Description :

The IBM Security Access Manager (ISAM) is a robust, flexible solution that provides secure, unified access management for web, mobile, and cloud applications. Professionals working with ISAM need a combination of technical expertise, problem-solving aptitude, and collaborative skills. This document outlines the comprehensive skillset required for a role focused on IBM Security Access Manager.

Requirements

1. Deep Understanding of IBM Security Access Manager

A thorough knowledge of ISAM's architecture, components, and functionalities is crucial. This includes experience with :

  • Installation, configuration, and administration of ISAM.
  • Policy-based access control and authentication mechanisms.
  • Federation services using SAML, OAuth, and OpenID Connect.
  • Integration with various directories and identity sources (LDAP, Active Directory).

2. Knowledge of Security Protocols and Standards

Professionals must be well-versed in security protocols and standards such as :

  • SSL / TLS for securing communication channels.
  • SAML for single sign-on (SSO) and federation.
  • OAuth and OpenID Connect for authorization and authentication.
  • WS-Federation and Kerberos for secure identity management.
  • 3. Proficiency in Network and Web Technologies

    A solid foundation in network and web technologies is required, including :

  • HTTP / HTTPS protocol.
  • Reverse proxy and web application firewall (WAF) configuration.
  • Domain Name System (DNS) and load balancing concepts.
  • Web application architectures and microservices.
  • 4. Experience with Identity and Access Management (IAM)

    Hands-on experience with IAM solutions, including :

  • Identity lifecycle management.
  • Role-based access control (RBAC) and attribute-based access control (ABAC).
  • Multi-factor authentication (MFA) implementations.
  • Single sign-on (SSO) solutions.
  • 5. Familiarity with Cloud Services

    Understanding how ISAM integrates with cloud environments is beneficial. Knowledge of :

  • Cloud security principles and best practices.
  • Deployment and management of ISAM on cloud platforms (AWS, Azure, GCP).
  • Integration with cloud-based identity providers.
  • Soft Skills

    1. Problem-Solving Abilities

    The role demands strong analytical and problem-solving skills to :

  • Diagnose and resolve complex technical issues.
  • Implement effective security solutions in dynamic environments.
  • Continuously improve access management processes and policies.
  • 2. Communication Skills

    Clear and concise communication is vital for :

  • Collaborating with cross-functional teams and stakeholders.
  • Documenting configurations, processes, and troubleshooting steps.
  • Providing training and support to users and administrators.
  • 3. Project Management

    Effective project management skills to :

  • Plan and execute ISAM deployment and upgrade projects.
  • Manage timelines, resources, and deliverables.
  • Ensure alignment with organizational goals and compliance requirements.
  • Certifications and Education

    1. Relevant Certifications

    Certifications that enhance credibility and expertise include :

  • IBM Certified Deployment Professional – Security Access Manager V9.0.
  • Certified Information Systems Security Professional (CISSP).
  • Certified Information Security Manager (CISM).
  • Certified Identity and Access Manager (CIAM).
  • 2. Educational Background

    A strong educational background in :

  • Computer Science or Information Technology.
  • Cybersecurity or Information Security.
  • Network Engineering or related fields.
  • Conclusion

    The role of an IBM Security Access Manager professional is multifaceted, requiring a robust combination of technical skills, soft skills, and a commitment to continuous learning. By mastering these competencies, individuals can effectively manage and secure access to critical resources, ensuring robust security for their organizations.