• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Identity and Access Management

OIT – Help Desk Support I ( 1 position ) Denver CO

February 15, 2016 by Bruce Brown Leave a Comment

Identity and Access Management Analyst
The Governor’s Office of Information Technology Identity and Access Management (IAM) work unit is responsible for how users within an organization are given an identity – and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization. The IAM analyst will be responsible for creating accounts in the Electronic Death Registration system. The analyst will work closely with Manager of IAM, CDPHE Program Area, IAM team and Customers.
This project serves to expand capacity in the Identity & Access Management team with the Governor’s Office of Information Technology to provide access credentials to Electronic Death Registration (EDR) system users. The Office of the State Controller has implemented the new system to increase efficiency and decrease delays for individuals awaiting issuance of death certificates.
In addition to those responsibilities listed above, the IAM analyst may be required to:
●    Review each registration packet received from the Office of the State Controller to determine user group assigned to applicant
●     Enter applicant data into the credentialing system to generate unique system access credentials
●    Issue complete credentials (set of user ID, Password, and PIN) to user through contact information documented in the applicant packet
●    If credentials cannot be verified or issued after two attempts to contact applicant, contractor shall document the issue or problem preventing completion of the process and maintain a list of users with unresolved/outstanding applications
Cooperative agreement:
This position facilitates identity and access management. The position is liable for ensuring that customer requests for security access is completed in a timely manner, provides second level technical support to the project team, end users and OIT functional groups. This position will perform ticket management and participate in project meetings. It is the responsibility of the IAM analyst to manage Identity and access within CA Service Desk, Customer Portal (EEM), Active Directory and Google.
Qualifications: 
The Identity and Access Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk, and Google. Due to the importance of this position, it is expected that a person supporting IAM has basic troubleshooting skills with networking and computer systems, can multitask, work in a fast paced environment while providing excellent customer service.
Terms and Conditions:
 As a condition of employment you may be required to submit to additional background checks and/or screenings during the course of your employment with OIT.
CYBER SECURITY
Contract staff is required to observe the Colorado Cyber Security Policies, as published and updated by the Office of Cyber Security. These policies provide guidelines concerning vendor security controls and vendor reporting and monitoring. Please reference P
Thanks & Best Regards
Nancy Sahni
22nd Century Staffing, Inc
Minorities  Woman own Company
Sr.Technical Recruiter
nancys@22ndstaffing.com
Position Title:                                                                    OIT – Help Desk Support I ( 1 position )
Position Id:                                                                         PO 2016-9259
Agency:                                                                                State of Colorado – OIT
Duration:                                                                             4.5 Months
Work Location:                                                                 4300 Cherry Creek Dr. S. Denver , Colorado  80246
Interview Type:                                                                In person Preferred
Citizenship mandate:                                                     US citizen preferred      

Filed Under: cyberspace workforce, Information Assurance Jobs, risk jobs Tagged With: colorado, denver, Governor’s Office of Information Technology, IAM, Identity and Access Management

Interview for Apple Identity and Access Management (IAM) Software Engineer in Bethesda, MD

February 10, 2016 by Bruce Brown Leave a Comment

Job title:-  Apple Identity and Access Management (IAM) Software Engineer
Location:- Bethesda, MD
Client:- NIH
Overview:
We are seeking an Apple IAM Software Engineer for the NIH Center for Information Technology (CIT) Identity and Access Management (IAM) service. As part of the IAM team, the Apple IAM Software Engineer will provide planning, architecture, design, development, maintenance and/or support of software tools that support the identity, credential, access and security needs of the NIH Macintosh community. You will break down software requirements and create highly complex systems; and lead mid and senior level engineers on complex tasks. You will also understand client needs working with internal and external customers; as well as, act as a mentor to junior software engineers.  This is a full-time position and will be based in the customers office in Bethesda, MD.
Responsibilities:
  • Support the NIHAuthPlugin (an open source project to enforce PIV login on Macintosh computers)
  • Support non-PIV two-factor authentication alternatives
  • Provide Mac security engineering support, e.g., pen-test scenarios involving Macs in the enterprise
  • Provide support for solutions to meet other NIH enterprise and IC-specific needs, e.g., tools and engineering advice to Institutes and Centers (ICs) that lack Mac expertise
  • Develop iOS apps, as needed
  • Provides recommendations to infuse new technology
  • Develops design artifacts
  • Collaborates with PMs/Users/Business Analysts (BAs) to comprehend requirements, evaluate alternatives, and establish timelines
Required Qualifications:
  • Master’s degree and 10+ years’ experience in the IT field (or equivalent combination of education and experience)
  • 3+ Years’ experience working with Apple/Macintosh
  • Knowledge of OS X’s authorization APIs
  • In-depth Objective-C knowledge
  • C / C++ and Swift knowledge for supporting surrounding frameworks
  • OS X System Python knowledge for installer scripts
  • Issue tracking and version controls with git
  • In-depth understanding of Public Key Infrastructure (PKI)
  • Mobile app development that could assist NIH in systems / security functions
Desired Qualifications:
  • Excellent English written and oral communication.

www.22ndstaffing.com

Filed Under: cyberspace workforce, DIARMF Jobs, risk jobs Tagged With: apple, Center for Information Technology, CIT, IAM, Identity and Access Management, information assurance manager, ios, macintosh, NIH

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Cybersecurity Jobs Resume Marketing: Book 1 Find Cybersecurity jobs
  • Security Control Assessor (SCA) Methods table top exercise
  • Cybersecurity Pro opinion about Tiktok
  • Las Vegas teleworking
  • STIGS in the RMF Process

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in