Rutland, Vermont23 days ago
This includes, but isn't limited to, administration, configuration of IAM/SSO technology, designing and implementing access provisioning and de-provisioning workflows, enabling thorough entitlement reviews and access recertification, implementing and optimizing role-based authorization, ensuring segregation of duties based on business rules, and enabling robust computer user account management. Attributes: Excellent communicator with outstanding critical thinking and decision-making skills who is adept at navigating nuances of leading a team of technical and non-technical company professionals in creating cyber architecture while building and maintaining key stakeholder relationships, developing trust, encouraging continuous learning, and achieving business results.