empty

Information Security Platform Administrator

OMM Solutions

Job Description

Posted on: 
November 12, 2024

Summary and company overview

Responsibilities

Experience in the configuration, deployment, and operation of two (2) or more of the following SAAS platforms:

  • SailPoint
  • CyberArk
  • Microsoft Purview
  • Archer Risk Management and/or Business Continuity modules.

Job Requirements

The candidate shall possess the following mid to expert level preferred skills, experience, and capabilities:

  1. Bachelor's degree with at least 10 years of experience.
  2. Any industry leading networking certifications of a professional level (CCIE or CCNP).
  3. Experience in the configuration, deployment, and operation of two (2) or more of the following SAAS platforms: SailPoint, CyberArk, Microsoft Purview, Archer Risk Management and/or Business Continuity Modules and other platforms as required. Proposed candidates with experience in all SAAS platforms listed are strongly preferred.
  4. Ten (10) years of relevant IT work experience with at least five (5) years of experience in the information security and SaaS management and administration field.
  5. Two (years) experience with hands on design, implementation, application customization and support experience with SaaS platforms.
  6. Proficient with information security platforms in an enterprise environment.
  7. Experience with SailPoint, CyberArk, Microsoft Purview and Archer with the ability to learn other platforms as required.
  8. Specific proficiency with the following:
    1. SailPoint
      1. Build application specific user attestations.
      2. Provide role-based access to individual system attestations.
      3. Ability to work with System Owners to build custom user attestation requirements.
      4. Provide training to the users of the system.
    2. CyberArk
      1. Privileged Cloud
      2. Remote Access
      3. User Account Management
    3. Microsoft Purview (Security & Compliance)
      1. Data Loss Protection
      2. Information Protection
        • Labeling and Encryption
        • Data Categorization and Classification
      3. Insider Risk Management
      4. Defender XDR
    4. Archer
      1. Risk Assessments
      2. Risk Mapping to NIST and Security Policies
      3. Risk Acceptance
      4. Risk Register
      5. Risk Tracker
      6. Risk Task Automation
      7. Business Continuity
      8. Security Incident Reporting
  9. Excellent communication, interpersonal and team skills.
  10. Ability to present technical information for knowledge transfer and training purposes.
  11. Ability to establish and maintain effective working relationships with peers, end users and vendor development staff, as well as all levels of management and judicial personnel as necessary.
  12. Ability to troubleshoot application specific problems and open support tickets as needed to address systems functionality issues.

Additional commentary

Summary and company overview

Apply now