Perform problem analysis of incidents / issuesand identify potential cause for the issues.
Identify potential issues in the currentimplementation and prepare solution design.
Perform impact analysis by interfacing withapplications and infrastructure team.
Design, enhance and maintain the buildprocesses(devops) required for the current implementation
Perform configuration changes as per thebusiness requirements.
Work with Product Vendor(s) and InternalTechnical teams to upgrade or enhance SailPoint system;
Provide Tier 3 analysis and root cause forSailPoint production issues;
Organize the technical team's processes.Requirements:
Work with customer on refining businessrequirement
Ensure that the business requirements coversfunctional and non-functional requirements
Ensure that the business requirements coversuser volumetric, growth projection and business expansion roadmap
Support customers to define the requirementsroadmap, building business case.
Responsible for Architecture and InfrastructureDesign
Coordinate team members for POC execution torealize Architecture implementation
Responsible for security system design andcapacity planning and sizing
Participate Architecture review with customerand product vendors
Design reusable components/frameworks
Perform usage analysis of existing reusabledesign components / frameworks
Internal Technical audit for IAM/Data Securityprojects
Code Review and Recommendations
Oversee Unit, Integration and performancetesting
Review test results
Technical and SDLC documentation review isexpected
10+ years of experience in IT with over 8 yearsof experience in Identity and Access Management.
@Cognizant.Cognizant is recognized as a Military Friendly Employer and is a coalition member of the Veteran Jobs Mission. Our Cognizant Veterans Network assists Veterans in building and growing a career at Cognizant that allows them to leverage the leadership, loyalty, integrity, and commitment to excellence instilled in them through participation in military service.
Associated topics: forensic, iam, information assurance, information security, leak, malicious, protect, security analyst, security officer, violation
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.