Identity and access management and security
- Full-time
Company Description
AG Technologies was founded as a software solutions company in 2008 & has its corporate headquarters at Chesterfield, Missouri with branches within the US and India. Over the years the organization has expanded into various market segments & activities including "Consultancy services" of technical personnel in large and multi-national organizations. Over the last five years, our client base of Fortune 100 companies has expanded dramatically
Job Description
The primary responsibilities of the Information Security Architect will include, but are not limited to, a combination of the following:
• Provide information security support to client’s ICAM work group by specifying security requirements and recommend implementation options that are in line with the WBG’s information security and technology standards.
• Work with project and development teams of new business solution to define information security requirements that are in line with the enterprise information securityarchitecture.
• Maintain an up-to-date understanding of emerging trends in identity and access management, especially in the area of authorization and identity lifecycle management; apply new techniques and trends to design a centralized authorization framework, taking into consideration the WBG business and IT environment.
• Interface with other ITS teams including, but not limited to, Certification and Accreditation, Security Engineering, Incident Response, and Event Management, to gather identified information security risks; develop risk profiles for enterprise-wide business applications and identify areas where existing security architecture requires change or development.
• Evaluate emerging authentication and authorization technologies for cloud and mobile applications. Test and integrate new IAM solutions with business applications.
• Document security architecture design review results and follow up on the implementation of recommended controls.
• Peer-review security architecture design artifacts produced by colleagues and provide feedback.
Qualifications
Selection Criteria:
1. Master’s degree in Computer Science or Information Systems with at least 5 years of relevant experience. (BS/BA is minimum education requirement with at least 7 years of relevant experience).
2. Preferably experience as an Information Security Professional designing secure solutions in an environment comprising of financial and trading systems, systems handling strictly confidential, personnel and proprietary information.