inventories, and topologies for Privileged.
policies related to data privacy, security, and access Managing relationships with IT vendors, including negotiating
recruiting for a Cyber Security and Identify and Access Management Consultant. Contract role until December 2025 of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and implement user access controls and identity and access management systems Monitor network and application performance system, and application user access control procedures and feedback to management to update policies and processes Distribute access control reports to support periodic reviews Provide required Management Information
Candidate must have strong I.T. knowledge in Access Management, Change Management, IT Operations, IT Risk controls, attestation, and direct access to data. Change Management: Establish and manage policies and configuration, account management, access control, vulnerability management, audit log management, email and controls, attestation, and direct access to data. Change Management: Establish and manage policies and configuration, account management, access control, vulnerability management, audit log management, email and
of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and implement user access controls and identity and access management systems
Charter
and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service best practices, including AWS Identity and Access Management (IAM), AWS Security Hub, AWS Config, and AWS
Advantageous: Identity and Access Management. Privileged Access Management (CyberArk, BeyondTrust, or
role
Valid drivers license
Access control management (biometric scanner)
Desktop/laptop
software updates, data backups, and user access management. Communication: Collaborating with HR, finance