Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!
Overview: We are seeking a highly skilled and experienced Senior Security Engineer to join our team. As a Senior Security Engineer, you will be responsible for designing, implementing, and maintaining security solutions to protect Qualys systems, networks, and data. You will work closely with cross-functional teams to ensure the effectiveness of security measures and help establish and enforce security policies and procedures.Responsibilities:Design and Implement IAM Infrastructure:
- Architect and build IAM infrastructure components, including identity management systems, directory services, authentication mechanisms, and access control mechanisms.
- Architect, design, and implement cloud-based IAM solutions, considering the unique challenges and opportunities presented by cloud environments.
- Develop secure IAM frameworks and workflows, ensuring scalability, reliability, and high availability of IAM infrastructure.
- Collaborate with system architects and network engineers to integrate IAM solutions into existing infrastructure.
User Provisioning and Access Control:
- Develop and manage user provisioning processes, including account creation, modification, and deprovisioning, ensuring compliance with access policies and procedures.
- Implement role-based access control (RBAC) frameworks and access control models to grant appropriate access privileges to users based on their roles and responsibilities.
- Implement automated identity provisioning and deprovisioning processes, ensuring efficient onboarding and offboarding of users in cloud environments.
- Monitor and audit user access rights, regularly reviewing and revoking unnecessary or excessive privileges.
Identity Federation and Single Sign-On (SSO):
- Design and implement identity federation solutions, enabling secure and seamless authentication and authorization across systems and applications.
- Develop and configure Single Sign-On (SSO) solutions using industry-standard protocols such as SAML, OAuth, and OpenID Connect.
- Integrate identity federation and SSO with external service providers and cloud-based applications.
Security Policies and Procedures:
- Assist in the development and enforcement of IAM security policies, standards, and procedures.
- Develop and enforce cloud identity governance processes, including user lifecycle management, access certifications, and access review workflows.
- Conduct regular assessments and audits of cloud IAM infrastructure to identify and address security vulnerabilities, gaps in compliance, and deviations from established policies.
- Stay up-to-date with industry trends, emerging threats, and best practices related to IAM infrastructure security.
- Collaborate with stakeholders to ensure that IAM infrastructure aligns with compliance requirements and industry regulations.
IAM Infrastructure Maintenance:
- Monitor the performance, availability, and security of IAM infrastructure components, proactively identifying and resolving any issues or vulnerabilities.
- Conduct regular maintenance activities, including software updates, patches, and system upgrades, to ensure the integrity and reliability of IAM infrastructure.
- Implement backup and disaster recovery mechanisms for IAM infrastructure components.
Access Control and Authorization:
- Develop and maintain access control models, including RBAC, ABAC (Attribute-Based Access Control), and dynamic authorization frameworks, to ensure granular and appropriate access privileges across systems and applications.
- Implement fine-grained access controls based on user roles, job responsibilities, and data sensitivity, balancing security requirements with operational efficiency.
- Monitor and enforce access control policies, regularly reviewing access permissions to identify and remediate any unauthorized access or potential security risks.
Multi-Factor Authentication (MFA) and Adaptive Authentication:
- Design and deploy multi-factor authentication (MFA) solutions to enhance the security of user authentication processes.
- Implement adaptive authentication mechanisms that dynamically adjust authentication requirements based on user behavior, risk levels, and contextual factors.
- Evaluate and select appropriate MFA methods (such as SMS, email, tokens, biometrics) based on the organization's risk profile and user experience considerations.
Identity Lifecycle Management:
- Develop and maintain identity lifecycle management processes, including user provisioning, user attribute management, password management, and account termination procedures.
- Collaborate with HR, IT, and other relevant departments to ensure efficient and secure onboarding, role changes, and offboarding of employees, contractors, and external partners.
- Implement self-service capabilities for users to manage their identities, passwords, and access requests, reducing administrative overhead and improving user satisfaction.
- Collaborate with DevOps teams to integrate IAM processes into CI/CD pipelines, ensuring secure and efficient deployment of cloud infrastructure.
Monitoring:
- Capture and analyze user activity logs to detect suspicious behavior, such as unauthorized access attempts or privilege escalations.
- Monitor and log access control decisions, privilege changes, and administrative activities for auditing and compliance purposes.
- Enable logging and monitoring of cloud IAM services to track changes, detect security incidents, and support forensic investigations.
- Correlate IAM logs with other security logs to identify anomalies, detect insider threats, and investigate security incidents.
Vendor Management:
- Engage with IAM solution vendors, assess their products and services, and participate in the selection and procurement process.
- Collaborate with vendors on solution implementations, upgrades, and issue resolution, ensuring alignment with business requirements and security standards.
- Manage vendor relationships, including contract negotiations, service level agreements (SLAs), and ongoing vendor performance evaluation.
Qualifications:
- Bachelor's degree in Computer Science, Information Security, or a related field. Relevant certifications such as CISSP, CISA, or IAM-specific certifications (e.g., CIAM, CIPP) are highly desirable.
- Proven track record of designing and implementing complex IAM solutions, preferably in a senior or lead role.
- In-depth knowledge of IAM concepts, frameworks, and best practices, including user provisioning, access management, authentication mechanisms, and identity federation.
- Familiarity with IAM tools and technologies, such as identity management systems, directory services, multi-factor authentication (MFA) solutions, and identity governance and administration (IGA) platforms.
- Understanding of cloud-based IAM solutions and integration with cloud platforms (e.g., Azure AD, AWS IAM).
- Experience with IAM governance processes, access certification, access review workflows, and risk-based authentication.
- Strong problem-solving and analytical skills, with the ability to assess complex IAM requirements, identify gaps, and propose effective solutions.
- Excellent communication and collaboration skills to work effectively with cross-functional teams, stakeholders, and external vendors.
- Strong project management skills to drive IAM initiatives, manage timelines, and deliver successful outcomes.