Analyse and understand the current IAM process and underlying legacy systems
2 ConfigureIAM/PAM solutions and integratewith applications
3 Configureconnectors for user provisioning and de-provisioning.
4 Providearchitectural solutions forcurrent problems and new requirements
5 Work with Security experts for the enhancements of Privileged Access Management (PAM) usingCyberArk
6 Alignsolutions with enterprise securitypoliciesin alignment with Security team
7 Perform ongoing support and troubleshooting for PAM and IAM environments.
8 Conduct operational maintenance as maybe required.
9 Hands-on experience with Java and JavaScript is essential for developing custom integrations, automations and enhancing IAM workflows.