Essential Job Functions:
- Discovering, defining and analyzing customer requirements
- Designing optimal solutions
- Implementing, testing and supporting those solutions
- Delivering expert guidance and knowledge transfer through documentation, presentations, and informal processes
Required Skills and Qualifications:
- 3 years experience with PingFederate, PingAccess and/or PingDirectory, including design, implementation, and integration in large-scale, complex environments.
- 5 years designing and deploying Identity and Access Management systems
- Bachelor of Science in a related field (e.g. Computer Science, Information Security, or Information Systems) or equivalent work related level of experience
- Experience with IAM protocols such as SAML, OAuth, OIDC, FIDO (U2F, UAF, CTAP, WebAuthn), XACML, Kerberos, and SCIM
- Experience with IAM concepts such as federation, single sign-on (SSO), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Zero Trust, and Passwordless
- Experience working with Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) cloud environments such as AWS
- Excellent oral and written communication skills
- Excellent analytical/critical thinking skills
- A self-starter that can work independently or collaboratively as needed
Desired Skills and Qualifications:
- PingFederate, PingAccess, and PingDirectory certifications
- Familiarity with Ping Identity’s PingOne technologies such as PingOne for Customers, PingOne for Workforce, PingID, as well as their Davinci (Orchestration), Fraud Detection, Risk Management, MFA, and Identity Verification capabilities
- Scripting skills (shell, powershell, Perl, OGNL, regular expressions)
- Programming skills (Python, Java, JavaScript, Node)
- DevOps concepts and related technologies such as containers and orchestration, in particular, Docker and Kubernetes
- Information Security certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM)
Top Skills
What We Do
We are a team of experts in cybersecurity, who specialize in protecting information assets against threats, both from inside the organization and outside.
We partner with your organization to understand your specific concerns and craft a cybersecurity strategy designed specifically for your business and your specific needs.
All of our experts come with 15+ years of information risk management experience in the Fortune 500 space. You can count on us to guide you throughout the process, and help you with your cybersecurity concerns.
Our specialty includes
- Cybersecurity
- Zero Trust
- Perimeter-less Security
- Workforce Identity and Access Management
- Consumer/Customer Identity and Access Management.