Start Date
Immediate
Expiry Date
02 Aug, 25
Salary
0.0
Posted On
03 May, 25
Experience
0 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Multi Factor Authentication, Information Protection, Operational Support, Web Application Security, Ownership, Advanced, Management System, Network Communications, Technology, Design, Integrated Systems, Excel, Documentation, Information Technology, Soft Skills
Industry
Information Technology/IT
KNOWLEDGE, SKILLS, ABILITIES, BEHAVIORS
THE CONSULTING PAM SECURITY ENGINEER IS PRIMARILY RESPONSIBLE FOR ADVANCED OPERATIONAL SUPPORT OF LARGE, COMPLEX AND DISTRIBUTED IDENTITY ACCESS MANAGEMENT (IAM) SYSTEMS WITH SPECIFIC FOCUS ON PRIVILEGED ACCESS MANAGEMENT (PAM). THIS PERSON WILL OPERATE AS A CRITICALLY IMPORTANT PARTICIPANT AND SUBJECT MATTER EXPERT IN DESIGN, IMPLEMENTATION, AND MAINTENANCE OF OUR PRIVILEGED ACCESS MANAGEMENT SYSTEM. AS A CONSULTING PAM SECURITY ENGINEER, YOU WILL BE RESPONSIBLE FOR DEPLOYING, CONFIGURING AND MANAGING PAM SOLUTIONS, ENSURING SECURE AND CONTROLLED ACCESS TO PRIVILEGED ACCOUNTS AND SYSTEMS. YOU WILL COLLABORATE WITH CROSS-FUNCTIONAL TEAMS, INCLUDING IT ADMINISTRATORS, SECURITY ANALYSTS, AND APPLICATION OWNERS, TO CONSTRUCT, IMPLEMENT, AND ENFORCE PAM BEST PRACTICES, PROCEDURES AND PROCESS CONTROLS. ADDITIONALLY, YOU WILL PROVIDE TECHNICAL EXPERTISE AND ADVANCED TROUBLESHOOTING ASSISTANCE TO ENSURE THE SUCCESSFUL OPERATION OF PAM SYSTEMS.THE TECHNOLOGY FOCUS FOR THIS ROLE WILL CONSIST OF THE IMPLEMENTATION AND SUPPORT OF HCA’S PRIVILEGED ACCESS MANAGEMENT SOLUTION AS WELL AS RELATED TOOLS AND TECHNOLOGIES WITH MINIMAL ASSISTANCE OR GUIDANCE.THIS INDIVIDUAL WILL WORK INDEPENDENTLY, AND COLLABORATIVELY, TO BUILD AND MAINTAIN PRIVILEGED ACCESS MANAGEMENT SOLUTIONS THAT MEET ORGANIZATIONAL NEEDS. THEY WILL DEMONSTRATE HIGH SELF-MOTIVATION, EXCELLENT COMMUNICATION, DOCUMENTATION AND RELATIONSHIP BUILDING SKILLS.THE CONSULTING PAM SECURITY ENGINEER WILL WORK CLOSELY WITH THE INFORMATION PROTECTION & SECURITY DEPARTMENT TO FORMULATE, CRITIQUE, WHEN NECESSARY, IMPLEMENT AND MAINTAIN HCA’S CYBERSECURITY GOALS.