What are the responsibilities and job description for the IT Security Specialist- Cloud Provisioning position at C4 Technical Services?
IT Security Specialist- Cloud Provisioning
Work Location : Remote
Description
Accountable for activities that ensure all users in the organization have the appropriate levels of access to applications, systems and data resources. Evaluates and maintains procedures to safeguard information systems assets from intentional or inadvertent access or destruction. Ensures compliance with Security regulations and laws. Recommends and implements changes to enhance security controls and prevent unauthorized access. Responsible for role-based implementation, role management, and access governance. Implements and manages the enterprise security support model for new applications. Monitors systems, networks, servers, and databases for potential system breaches. Responds to alerts from information security tools. Assigned to projects of medium size / scope. Provides consultative expertise on a wide variety of project and initiatives.
Essential functions :
Performs a lead role in promotion of security awareness programs, assessing gaps and implementing solutions.
Responsible for the end-to-end completion of security requests.
Provisions user security roles and manages security groups across systems, platforms, databases, applications, servers, directors and folders.
Analyzes existing role structures to improve and streamline structures, security administration and improve end-user experience.
Responsible for highly sensitive security access for outsourced vendors and ensuring compliance with policy, regulations and contractual requirements.
Accountable for highly sensitive emergency processes.
Creates or maintains application scripts and uses application specific tools to create or manage application security.
Tracks and documents security issues and requests, actively monitors work queue.
Plans, coordinates, communicates, tests and implements audits ensuring that access entitlements are appropriate for job requirements.
Creates and coordinates completion of detailed security reports to fulfill audit, management or business owner requirements.
Accountable for follow-up of all security work requests including collaborating with other IT areas to ensure timely completion / resolution and obtainment of appropriate approval levels.
Interfaces with users to understand new capabilities, implement procedures, ensure security procedures have been communicated properly and are being adhered to.
Provides input to drive process improvements.
Works closely with business areas and IT partners on troubleshooting, pre-implementation activities and to assess application security.
Maintains and creates operational procedures and maintains Security Knowledge Base.
Performs system monitoring activities, identification and evaluation of security threats, breaches and vulnerabilities.
Responds to security alerts.
Responsible for on-call release support.
Acts as lead liaison for internal and external audit requests and activities. Leads remedial activities as the result of audit findings.
Defines scope of operational initiatives and adjusts priorities to support workload.
Provides subject matter expertise, leadership and guidance to work teams and end users on security policies, standards and procedures and processes.
Investigates business processes to understand and implement security requirements weighing business needs and security risks and resolving issues.
Researches solutions works with vendors to enhance Security Monitoring Program.
Coordinates and documents exceptions to security policy as directed by the Exception Governance Team.
Develops training content as needed.
Job Duties :
In-depth knowledge of Information Technology field and computer systems
Demonstrated organizational skills
Demonstrated ability to adapt to change and collaborate as part of a team
Ability to manage tasks independently without close supervision and take ownership of responsibilities
Ability to learn from mistakes and apply constructive feedback to improve performance
Must demonstrate initiative and effective independent decision-making skills
Ability to communicate technical information clearly and articulately
Must have an understanding of the systems development life cycle
Must have advanced security knowledge of the organization's existing platforms, systems, databases, and application security and are able to handle most regular issues independently.
Advanced analytical thinking, problem solving, quantitative analysis ability.
Must have an advanced understanding of Information Security concepts, protocols, industry best practices, and regulatory requirements.
Must have advanced proficiency with RACF, TSO and tools used to administer security on the mainframe
Must have advanced proficiency with Active Directory groups and user accounts, Windows folder structures and folder security.
Proficiency with Windows skills are required, e.g., Windows Explorer, Word, Excel, PowerPoint, Outlook, etc.
Must have advanced proficiency of UNIX / Linux security and tools used to administer security in these environments
Must have advanced proficiency of LDAP groups and user accounts and tools used to administer security in this environment
Must have advanced proficiency with database security and tools used to administer security within the various databases, e.g., UDB, DB2, SQL and Oracle
Must demonstrate expertise with security management tools
Strong knowledge of business processes is required
Works without daily supervision to meet customer expectations
High critical thinking skills to evaluate alternatives and present solutions that are consistent with business objectives and strategy
Experience using Agile methodology specific tools, languages and specialty skills may vary
Required Experience :
4 year of related work experience or equivalent combination of transferable experience within IT Security
Required Education : HS Diploma or GED
Preferred Certification :
COMPTIA Security or equivalent
Responsibilities
Design, implement, and manage robust identity and access solutions on Microsoft Azure / OCI / AWS platform
Configure and Maintain Microsoft Entra ID, Including users and group management.
Implement Role-Based Access Control (RBAC) for Azure resources ensuring least privilege access.
Configure PIM and PAG policies
Stay up to date with cloud security best practices and implement them to enhance overall security posture
Design, Implement, and manage identity lifecycle processes, including user provisioning, deprovisioning and access reviews.
Assist project teams with Active Directory integration patterns using AD and Azure AD, Azure MFA, ADFS & Azure Federation and SSO patterns
Qualifications
Proven Experience as a cloud IAM security specialist
In depth Knowledge of RBAC Implementation for Azure resources and Microsoft Enterprise Application
Expertise in configuring and managing Microsoft Entra ID, users, and groups
Strong understanding of Privilege Identity management and Privileged Access Group Policies
Broad understanding of the IAM cybersecurity landscape including identity stores, authentication / authorization, strong authentication, and privileged access management capabilities and methodologies
Understanding of Azure IAM, Active Directory environment, and Microsoft Azure Access Controls
Strong understanding of AWS
Working knowledge of coding with PowerShell, Python, or other scripting languages
Ability to effectively prioritize work on multiple simultaneous requests and execute tasks in a fast-paced environment while balancing conflicting demands
Strong communication skills, both verbal and written, with the ability to communicate technical details in a clear, concise, understandable manner
Basic understanding of Microsoft Security services (e.g., Microsoft Defender for Identity, Azure Information Protection, Microsoft Cloud App Security)
General understanding of Oracle Identity Cloud offering
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a IT Security Specialist- Cloud Provisioning?
Sign up to receive alerts about other jobs on the IT Security Specialist- Cloud Provisioning career path by checking the boxes next to the positions that interest you.