10 HOT – REMOTE Contracts: Financial/Banking Vertical, Multiple Centrify Security Expertise with Sailpoint Governance

REMOTE Contract: Multiple Centrify Security Expertise with Sailpoint Governance

Duration: 12 Months

Banking/Financial Vertical

TEG client provides security expertise: Network Security, Information/Data Security, SSO, penetration testing, etc.

They currently have numerous needs but are really needing & seeking to qualify consultants who have expertise with the Centrify Product Line:Centrify Areas of Expertise:a) Zero Trustb) Application Servicesc) Endpoint Securityd) Infrastructure Servicese) AnalyticsCentrify Certifications:a) CTS CSSEb) CTS DCSc) CTS DCDASd) CTS SAASe) CTS CPSf) CTS DCOSXg) CTS CISAPPMAC

TEG client provides security expertise: Network Security, Information/Data Security, SSO, penetration testing, etc.

They currently have numerous needs but are really needing & seeking to qualify consultants who have expertise with the Centrify Product Line & Sailpoint Governance:Centrify Areas of Expertise:a) Zero Trustb) Application Servicesc) Endpoint Securityd) Infrastructure Servicese) AnalyticsCentrify Certifications:a) CTS CSSEb) CTS DCSc) CTS DCDASd) CTS SAASe) CTS CPSf) CTS DCOSXg) CTS CISAPPMAC

Centrify Expertise, will be specific to the Infrastructure Application Services area.

a) Centrify Integration with Sailpoint Governance.

b) Design, Architecture, Development, SSO (Single Sign On)

c) O-Off, C-directory Structures (2000 at First Data)

d) Application on boarding of Centrify

e) UAT Testing

f) 500 Sailpoint applications. SailPoint’s identity management solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and devices to create an identity-enabled enterprise.

Compliance Controls

Access certification and identity policy are critical to achieving continual compliance.

Access Request and Automated Provisioning

Ensure the right people have the right access to the right applications at the right time.

Password Management

Allow users to reset passwords automatically while enforcing corporate policy.

Identity Governance for Files

80% of corporate data is unstructured. You need to govern access to all of your data.Please send in your resume for more information and to speak with a TEG Technical Recruiter.
Thank you.Click here to ApplyPlease send in your resume for more information and to speak with a TEG Technical Recruiter.
Thank you.