IAM Engineer

2 days ago


Hoover, United States Pinnacle Group, Inc. Full time

Job Title: Customer Authentication Engineer III

Location: Hoover, AL./Charlotte, NC, / Birmingham, AL. / Nashville, TN.

Duration: 6 Month of Project (Temp to Hire)

Pay Rate: $45/hr. $55/hr. on W2 (without benefit)


Job Summary:

At Regions, the Software Engineer oversees application development, modification, and maintenance of applications. This position monitors system applications, ensures systems run smoothly, and creates reports and other documentation outlining findings/solutions.


Primary Responsibilities

  • Performs administration duties for the Identity and Authentication platforms
  • Develops and maintains detailed technical documentation related to the Customer Authentication and Identity platforms including on-premise and cloud-based deployments Serves as support for architecture, support, engineering, and application development issues related to Customer Authentication and Identity Analyzes, troubleshoots, and develops third-party integrations for related authentication and identity tools
  • Creates new ways to solve existing production security issues related to authentication
  • Evaluates new technologies and processes that enhance authentication capabilities and collaborates with management to enact change
  • Establishes plans and protocols to protect data and information systems against unauthorized access, modification, and/or destruction
  • Delivers technical reports on daily activities
  • Analyzes and advises on new authentication technologies and program conformance
  • Maintains knowledge of current and emerging technologies and advancements associated with Omni-channel and Digital Authentication and Identity offerings including Cyber Crime related activities
  • Analyzes security scenarios and provides data-driven solutions and recommendations to management
  • May offer advice and guidance to junior engineers


Requirements

  • Bachelor’s degree and four (4) years of experience in Information Security/Technology High School Diploma or GED and eight (8) years of experience in Information Security/Technology


Preferences

  • Experience with Agile methodology and SDLC concepts/tools (Git, Atlassian stack)
  • Experience with cloud-based technologies and environments such as AWS and Azure Experience with Linux/Unix, Windows, scripting (with programming languages such as Bash, PowerShell, or Perl), SQL, LDAP, and web services
  • Experience with one or more programming languages such as Java, C#, C/C++, Python, or JavaScript Ability to articulate complex technical concepts/scenarios to both technical and non-technical audiences
  • Preferred if has experience with FIDO, Webauthn, OTP, Biometrics, and multifactor authentication (MFA) platforms
  • Financial services experience Relevant security certifications (e.g. CISSP, CIAM, etc.)


Skills and Competencies

  • Ability to multi-task, to be self-initiated, and work independently
  • Excellent customer service and interpersonal skills
  • Good time management skills
  • Knowledge and skill in technical problem resolution
  • Strong attention to detail and outstanding analytical skills
  • Strong organizational, research, analytical and/or problem-solving skills to evaluate situations, make recommendations, and take effective action Strong written and verbal communication skills



  • Hoover, United States Regions Bank Full time

    As a Security Governance Engineer at Regions Bank, you will be responsible for designing, developing, testing, implementing, and integrating Identity and Access Management (IAM) systems and solutions. You will work closely with business and IT partners to deliver Identity Governance and Administration (IGA) capabilities across Regions Bank.This role requires...


  • Hoover, United States Regions Bank Full time

    At Regions Bank, we are seeking an experienced Identity and Access Management (IAM) engineer to join our team. This role will be responsible for designing, developing, and implementing IAM systems and solutions that protect information resources against unauthorized use. The ideal candidate will have a strong understanding of identity governance and...