IntroductionInformation and Data are some of the most important organizational assets in today's businesses. As a Security Consultant, you will be a key advisor for IBM's clients, analyzing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.Your Role and ResponsibilitiesOverall responsibility of IBM execution and delivery and ensuring customer satisfaction.Management of in-scope IAM application systems management activities.Responsible for application service levels.Enforce the compliance with all operational standards and procedures.Assess the quality of service delivered by IBM personnel.Manage IBM's obligations of the project are completed.Perform periodic quality audits on the process to ensure compliance.Monitor and report on production support and maintenance related activities and its progress against the service levels.Produce periodic status reports.Manage issues resolution and escalate if necessary.Attend Customer/IBM meetings to discuss the schedule, incidents, issues and change requests.Monitor the proper hand-over of tasks from an outgoing member to his replacement to ensure continuity of operations.Required Technical and Professional ExpertiseHands-on experience in IAM security or related fields.Experience in identity management and knowledge of role and profile management or similar.Familiarity with scripting languages (such as Python, Java, Bash Shell or PowerShell).Experience with identity tools like Verify Governance, IBM Security Identity Management, SailPoint or similar.Knowledge of identity lifecycle and access control methods.Experience with Linux and Windows operating systems and Oracle SQL or DBase databases.Methods of authentication such as OAuth, Kerberos, LDAP, etc.Experience with single sign-on processes.Experience with federation authentication processes.Preferred Technical and Professional ExpertiseEnglish and Spanish language.CyberArk or similar PAM solutions.SailPoint or similar IGA solutions.Security Frameworks (NIST, ISO) or other.#J-18808-Ljbffr