environment (2008/2012/2016/2019). *Working experience of administering Linux Systems. *Experience of working with Two FactorAuthentication (RSA) and PKI/Certificate technologies. *Working knowledge of PowerShell and experience in developing automated processes. *Experience administering DNS and DHCP. *Good working knowledge More ❯
backup systems, VoIP and video conference systems. Implement and manage: Endpoint protection solutions (antivirus/encryption), Patch management systems, Two-factorauthentication infrastructure. Ensure compliance with enterprise security policies Provide desktop support (in-person/remote) for employees, including VIPs. Support onboarding/offboarding (system deployment More ❯
and Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication and Access Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem … and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factorauthentication (MFA), single sign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory More ❯
and Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. * Authentication and Access Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) * Problem-Solving and Analytical Abilities: Strong problem … and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities. * Implements and manages multi-factorauthentication (MFA), single sign-on (SSO), and other authentication methods to secure user access. * Ensures compliance with regulatory More ❯
and Automation: Ability to write scripts (e.g., PowerShell, Python) to automate repetitive IAM tasks, streamline workflows, and integrate IAM solutions with other systems. Authentication and Access Managment: Strong experience in integrated third parties and applications using industry standards (SAML/OIDC) Problem-Solving and Analytical Abilities: Strong problem … and enforces policies and procedures for user access, ensuring appropriate levels of access based on job roles and responsibilities. Implements and manages multi-factorauthentication (MFA), single sign-on (SSO), and other authentication methods to secure user access. Ensures compliance with regulatory More ❯