IAM Architect with Ping Experience

Posted 4 Days Ago
Be an Early Applicant
Hiring Remotely in United States
Remote
Senior level
Cybersecurity • Data Privacy
The Role
The IAM Architect will deploy and support the Ping Identity platform, execute migrations, analyze infrastructure updates, assist clients, and engage in knowledge sharing.
Summary Generated by Built In

Cloud Security Services is seeking an experienced information security professional for a full-time opportunity. This position requires a solid understanding of web application security and architecture, cloud deployment strategies, excellent debugging and troubleshooting skills, as well as strong analytical and problem-solving capabilities. The ideal candidate will be an energetic entrepreneur with enterprise security experience, strong interpersonal and communication skills, a dedicated work ethic, and the ability to learn new technologies quickly. 
 
Summary of Job Responsibilities 
 
 

  • Work with internal and client-side resources to deploy and support PingAccess, Ping Federate & PingDirectory in high-availability environments 

  • Plan and execute migrations from 3rd party IAM vendors to the PingIdentity platform 

  • Develop strategy and deployment plans for extending the reach of the Ping product suite to additional applications 

  • Analyze and plan significant infrastructure updates and product upgrades 

  • Respond to client calls for assistance with Ping related issues 

  • Assist clients with scalability planning for future security needs 

  • Share general product knowledge with co-workers and the security community via participation in social media platforms 

 
 
Minimum Requirements 
 
 

  • Bachelor of Science in Computer Science, Mathematics or a related discipline, or commensurate professional experience 

  • At least 5 years of experience with the Ping Identity Platform, SSO, user directories, and web access management technologies 

  • Strong understanding of federation technologies such as oAuth, OpenID Connect & SAML 

  • Demonstrated expertise deploying identity technologies on industry leading cloud platforms (AWS, Google Cloud, and Microsoft Azure preferred) 

  • Certified in at least one of the following: PingAccess, PingFederate, PingDirectory 

  • Authorized to work in the US for any employer 

 
Preferred Skills 
 
 

  • Ability to work in team-oriented environment where collaboration is encouraged and valued 

  • Self-direction and independent problem-solving 

  • Ability to combine data and knowledge from various sources to determine the proper approach for planning and execution 

  • Ability to accept constructive criticism and debate opposing viewpoints in order to arrive at the best solution for the client 

  • Demonstrated working knowledge of web servers, clients and browsers, LDAP directories, and Oracle or Microsoft Server databases 

  • Ability to advise on cloud, on-prem, and hybrid IAM deployment strategies 

  • Knowledge of common network services and protocols such as TCP/IP, DNS, SSH, HTTPS, VPN 

  • Solid Windows & Unix skills 

  • Demonstrated knowledge of common programming practices 

  • Excellent written and verbal communication skills 

  • Experience with Web application servers, SAML, XML, SOAP and web services is strongly preferred 

  • Network topology design, security, performance, and fault tolerant architecture experience is a plus 

  • Ability to travel to clients 


Top Skills

AWS
GCP
Ldap
Azure
Microsoft Server
Oauth
Openid Connect
Oracle
Pingaccess
Pingdirectory
Pingfederate
SAML
Unix
Windows
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
Princeton, NJ
4 Employees
Year Founded: 2018

What We Do

We are a team of experts in cybersecurity, who specialize in protecting information assets against threats, both from inside the organization and outside.

We partner with your organization to understand your specific concerns and craft a cybersecurity strategy designed specifically for your business and your specific needs.

All of our experts come with 15+ years of information risk management experience in the Fortune 500 space. You can count on us to guide you throughout the process, and help you with your cybersecurity concerns.

Our specialty includes
- Cybersecurity
- Zero Trust
- Perimeter-less Security
- Workforce Identity and Access Management
- Consumer/Customer Identity and Access Management.

Similar Jobs

Doodle Labs Logo Doodle Labs

Director, U.S. Government Sales & Business Development — Uncrewed Systems (UAS)

Aerospace • Hardware • Internet of Things • Robotics • Wearables • App development • Automation
Remote
United States
50 Employees

Doodle Labs Logo Doodle Labs

Account Manager

Aerospace • Hardware • Internet of Things • Robotics • Wearables • App development • Automation
Remote
United States
50 Employees

Doodle Labs Logo Doodle Labs

Channel Manager (Global)

Aerospace • Hardware • Internet of Things • Robotics • Wearables • App development • Automation
Remote
United States
50 Employees
120K-200K Annually

General Motors Logo General Motors

Counsel

Automotive • Big Data • Information Technology • Robotics • Software • Transportation • Manufacturing
Remote or Hybrid
2 Locations
165000 Employees
110K-172K Annually

Similar Companies Hiring

MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
US
507 Employees
Caliola Engineering Thumbnail
Software • Machine Learning • Hardware • Defense • Data Privacy • App development • Aerospace
Colorado Springs, CO
65 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account