REMOTE Contract: Multiple Centrify Security Expertise with Sailpoint Governance
Duration: 12 Months
Banking/Financial Vertical
TEG client provides security expertise: Network Security, Information/Data Security, SSO, penetration testing, etc.
They currently have numerous needs but are really needing & seeking to qualify consultants who have expertise with the Centrify Product Line:Centrify Areas of Expertise:a) Zero Trustb) Application Servicesc) Endpoint Securityd) Infrastructure Servicese) AnalyticsCentrify Certifications:a) CTS CSSEb) CTS DCSc) CTS DCDASd) CTS SAASe) CTS CPSf) CTS DCOSXg) CTS CISAPPMAC
TEG client provides security expertise: Network Security, Information/Data Security, SSO, penetration testing, etc.
They currently have numerous needs but are really needing & seeking to qualify consultants who have expertise with the Centrify Product Line & Sailpoint Governance:Centrify Areas of Expertise:a) Zero Trustb) Application Servicesc) Endpoint Securityd) Infrastructure Servicese) AnalyticsCentrify Certifications:a) CTS CSSEb) CTS DCSc) CTS DCDASd) CTS SAASe) CTS CPSf) CTS DCOSXg) CTS CISAPPMAC
Centrify Expertise, will be specific to the Infrastructure Application Services area.
a) Centrify Integration with Sailpoint Governance.
b) Design, Architecture, Development, SSO (Single Sign On)
c) O-Off, C-directory Structures (2000 at First Data)
d) Application on boarding of Centrify
e) UAT Testing
f) 500 Sailpoint applications. SailPoint’s identity management solutions provide complete visibility into who is doing what, what kind of risk that represents, and allows you to take action. It links people, applications, data and devices to create an identity-enabled enterprise.
Compliance Controls
Access certification and identity policy are critical to achieving continual compliance.
Access Request and Automated Provisioning
Ensure the right people have the right access to the right applications at the right time.
Password Management
Allow users to reset passwords automatically while enforcing corporate policy.
Identity Governance for Files
80% of corporate data is unstructured. You need to govern access to all of your data.Please send in your resume for more information and to speak with a TEG Technical Recruiter.
Thank you.Click here to ApplyPlease send in your resume for more information and to speak with a TEG Technical Recruiter.
Thank you.