Identity Governance and Administration Engineer, Mid

The Challenge:

Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your Cyber skills to design and build secure systems for the US government? We’re looking for an engineer who can help create solutions for that will stand up to even the most advanced Cyber threats.

 

 As an Identity Governance Administration (IGA) engineer, you will apply expertise in Cybersecurity to Identity and Access Management (IAM) to analyze, design, and support a continuous monitoring solution to verify and validate appropriate user privileges, assigned credentials, trustworthiness, appropriate user security behavior training, and appropriately granted resource access rights to users. Engage multiple stakeholders and leverage related security products or technologies to recommend the solution architectures and designs needed to monitor and report on IAM-related data across multiple government agencies. Integrate disparate IAM data from multiple sources into a singular database for correlation and presentation. Maintain responsibility for articulating and authoring multiple findings, recommendations, and other artifacts, including interfacing with key stakeholders to implement tailored IAM solutions. You will work with architects, SMEs, and other engineers, and provide work leadership to junior employees, as needed.

 

 Empower change with us.

 

 You Have:

 -3+ years of experience with IT, including supporting access management solutions, including connector and systems integrations, entitlement management, user credential management, or user security behavior monitoring

 -3+ years of experience with supporting IAM, security operations and threat response, or security architecture

 -3+ years of experience with requirements, design, implementation, integration, testing, or change management

 -Experience with Commercial, Off-the-Shelf (COTS) IAM tools, including SailPoint or Saviynt

 -Knowledge of Active Directory or Lightweight Directory Access Protocol (LDAP) management, configuration or design, Public Key Infrastructure (PKI) X509, Special Security Office (SSO) across multiple domains, 2FA via personal identity verification (PIV) or Common Access Cards (CAC), and scripting and coding

 -Ability to obtain a security clearance

 -BA or BS degree

 

 Nice If You Have:

 -Experience with CyberArk, CA Privileged Access Manager (PAM) or Broadcom Layer 7, Centrify, or BeyondTrust

 -Experience with Java, JavaScript, BeanShell, JSON, XML, or REST development

 -Experience with supporting IAM in a Cloud environment, including Azure or Amazon Web Services (AWS)

 -Experience with Structured Query Language (SQL) database administration or management

 -Experience with security information and event management (SIEM) tool, including Splunk or the Elasticsearch, Logstash, and Kiban (ELK) stack

 -Experience with authoring Cybersecurity guidance, including policies, strategies, and whitepapers

 -Experience with implementing PKI and PIV standards

 -Experience with HSPD-12, FIPS 201-2, FICAM, OMB 11-11, FedRAMP, PCI, FISMA, or NIST 800-53, 800-63, 800-79-2, or 800-157 policies and standards a plus

 -MS degree in IT, Information Systems, or CS

 

 Clearance:

 Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

 

 Build Your Career:

 Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen Cyber. When you join Booz Allen, we’ll help you develop the career you want.

 

 Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

 Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.

 Cyber University — CyberU has more than 5000 instructor-led and self-paced Cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

 Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in Cybersecurity—fully funded without a tuition cap.

 Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

CDM

Not ready to apply? Join our talent community and sign up for job alerts.