Job Location : Racine,WI, USA
Job Description Our Client is seeking a well-rounded Computer Systems Analyst for an onsite role based in Racine, WI. Required Skills: 10 years of hands-on IAM Engineering experience Experience in migrating SSO from PingFed to Azure Experience with Certificate Renewals/PKI Infrastructure Experience with CyberArk patches and upgrades Experience with Splunk migration to cloud Minimum, a bachelor's degree in computer science, computer information systems, or information technology, or a combination of education and experience equivalent to a U.S. bachelor's degree in one of these fields Responsibilities: Analyze security of systems, networks, or data. Develop and maintain security controls for cybersecurity threat detection, data protection, and security analysis. Support IAM related tasks including access incident response, investigation, security threats identification and mitigation, and security measure improvements. Conduct security code reviews, debugging, and testing to ensure security and functionality. Migrate SSO from PingFed to Azure. Implement and manage Microsoft Entra and access. Implement MFA using conditional Access policy in Azure AD. Configure SSO with SAML, OIDC, OAuth in Azure AD. Integrate third-party MFA solutions (RSA, Duo) with Entra ID. Manage applications and assets, capacity planning, pilot testing, migration planning, performance testing, validation, and documentation. Handle Certificate Renewals/PKI Infrastructure. Implement encryption, authentication, and authorization mechanisms to secure data transmission and storage. Manage CyberArk patches and upgrades. Keep up-to-date with cybersecurity trends and best practices to improve security posture. Develop SOPs for transitioning IAM operations to MSP. Plan, design, deliver, and implement IAM solutions. Collaborate with partners to meet business goals and compliance requirements. Migrate Splunk to the cloud. Work with cross-functional teams to integrate data sources and event logs into a Security Incident Event Management system, correlate security events, create automated incident response playbooks, and establish procedures. Configure network and document activities. Maintain records of code, processes, configurations, policies, tuning, troubleshooting, patches, and security measures. #J-18808-Ljbffr