Champion the elimination of separate passwords for various systems accessed by end users, work with other IT teams to enable Single Sign On, encourage vendors to support SSO, and monitor which vendors roll out SSO support for the products.

More Uses of the Single Sign On Toolkit:

  • Establish: work closely with account development executives (sales) providing technical input into all relevant customer relationship activities as related to SSO and seamless authentication.
  • Be accountable for analyzing system requirements, user requirements, documenting business processes and selecting appropriate hardware and software for system design.
  • Identify areas where team members need additional training, and coordinate/lead training delivery to continuously enhance technical knowledge.
  • Orchestrate: proactively reach out to customer contacts, facilitating training opportunities and sharing relevant product and feature information.
  • Manage work with product managers and technical architects to develop new features for the leading digital change management solution built on the Salesforce platform.
  • Be accountable for architecting and reviewing Federated Single Sign On using various open standards, particularly Security Assertion Markup Language (SAML) and OpenID.
  • Be certain that your group complies; mentors other team members to promote the growth of IT related skills and knowledge; promotes an environment of continual improvement.
  • Warrant that your project provides a complex understanding the business usage of information technology (IT) and helping technology add value to the business.
  • Validate that the management of Spears user directory, Single Sign On and Identify and Access Management capabilities are updated and in line with Policy.
  • Interact with key stakeholders and project/program teams to understand requirements and engineering solutions based on best practices.
  • Establish that your organization keeps abreast of current financial aid regulations and financial aid information systems pertaining to functional areas of responsibility.
  • Ensure you designate; understand the strengths and weaknesses of your organizations competitors and to use to maximum advantage to sell the Identity Automation product and deliver real value to customers.
  • Be accountable for responding to technical inquiries about the solution relative to architecture, security, privacy, performance and integration capabilities.
  • Secure that your design participates in or leads low to medium complexity projects that support current technology and implement new technologies in an effort to optimize or improve identity management functions.
  • Collaborate with developers, share technical components and knowledge and contribute to consideration on coding practices.
  • Ensure you allocate; lead the business requirements process with organization management and department leaders for identifying technology solutions.
  • Arrange that your organization integrates and maintains servers and applications; work proactively with other IT staff to communicate and coordinate infrastructure changes.
  • Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement.
  • Confirm your project serves as a go to resource for Identity and Access Management Analysts and contractors (vendors) and/or provides oversight of access provisioning of daily business as usual operations.
  • Develop: track and analyze customer inquiries, diagnose the root cause of complex technical issues and present options to solve problems and recurring issues.
  • Ensure your team performs file system configuration and management; creates, performs, and validates server backups and recovery procedures.
  • Warrant that your organization provides complex technical research and analysis to support business operations needs and presents findings to management or project leader.
  • Methodize: under direction, plans, implements, upgrades, and monitors all types of information technology (it) to achieve high levels of confidentiality, integrity, and availability of organization IT systems.
  • Make sure that your group complies; principles, theories, standards, practices, protocols, and procedures for systems analysis and design in the applicable systems environments.
  • Warrant that your corporation complies; conducts a variety of Cybersecurity policy compliance audits as discovering unauthorized devices, conducting site surveys and reviewing applications for non compliance, and ensuring network access requirements are met.
  • Utilize IAM monitoring tools and industry best practices to monitor systems for potential issues and ensure governance processes and industry best practices are working as designed.
  • Control: actively monitor and continuously improve the production environment to ensure optimal performance, reliability, and scalability.
  • Use best practices for O365 product implementation, manage project activities, resources and tasks in a fast and changing project environment.
  • Guide: work closely with product, technology, and engineering to develop and maintain expertise across all solution offerings ensuring the latest and most appropriate capabilities are reviewed with account team.
  • Construct and assess high level and detailed security programs translating business needs and regulatory requirements into cost effective and risk appropriate controls.

 

Categories: Articles