11 Jan
Privileged Access Management (PAM) Engineer - Linux/Unix
New York, Remote , 10001 Remote USA

Vacancy expired!

Privileged Access Management (PAM) Engineer - Contract - Remote (EST)Please Note: This role is only available on a W2 candidates to candidates who do not require sponsorship. Genuent does not sponsor any visas at this timeSummary:This position supports the enterprise Privileged Access Management systems. The candidate will be expected to have engineering experience in numerous areas of Identity & Access Management and Privilege Access Management methodologies and solutions. As a Privilege Access Management (PAM) Engineer, you will:Major Responsibilities:

  • Work with IT infrastructure and application teams to migrate privileged accounts from legacy to enterprise systems, and local UNIX to AD accounts, and clean up local UNIX accounts and disable accounts in legacy systems
  • Resolve local UNIX UID and GID conflicts
  • Convert sudo commands to dzdo commands
  • Provide engineering support for Centrify Agents in all UNIX/Linux environments
  • Work with Centrify Vendor to open tickets and resolutions
  • Develop or enhance UNX script process for accounts migration
  • Develop and implement procedure, runbook, and documents to support the Centrify services
  • Support and onboard servers and users to Centrify services
  • Support in troubleshooting and resolving complex authentication, authorization and integration problems
Qualifications:
  • Bachelor's degree in Computer Science, Technology, or Related Fields.
  • 5+ years engineering level experience with Linux (Redhat , AIX and Solaris)
  • 5+ years experiences in Shell Scripting (korn/bash)
  • Experience and familiar with Centrify AD bridging, Centrify Access Manager
  • Working experience of UNIX to Active Directory Bridging services and RFC-2307 (Preferably experienced with Centrify or Quest Vintela Authentication Services)
  • Experience with PAM tools such as CA PAM, TPAM, Control Minder
  • Maintain Technical documentation, Create and maintain procedural documents (SOP's).
  • Familiarity with high-availability concepts and setups
  • Managed large numbers of enterprise 4000 Linux/Unix servers
  • Knowledge of operation system and hardware security techniques
  • 5+ years administrative experience Windows Servers 2003, 2008 and 2012
  • Maintain and enhance Active Directory Group Policy to meet organization needs.
  • Write implementation and design documentation describing architecture, procedures, and security.
  • Ability to write PowerShell and batch shell scripts
  • Knowledge of operation system and hardware security techniques
  • Must know MS SQL and experience in SQL queries and reporting
  • Solid communication skills
  • Familiar with Service Now ticketing and change management systems
  • Familiar with CA Identity Portal and RSA Aveksa Recertification
Education and Certifications
  • Bachelors degree in computer science, Business Administration or equivalent educational or professional experience and/or qualifications. An advanced degree is also preferred.
  • Certifications such as: CISSP, CISM, CRISC, or CISA certification a plus
If interested, please contact Margot Parsons at or call

Vacancy expired!


Report job