Title: Identity Management (594005)
Location: Raleigh, NC
Duration: 12 months
Interview: In Person Only
# of positions: 1
This position will provide directory/identity management services to each of the executive branch agencies within the scope of the Enterprise Active Directory services. Need knowledge of hardware/software infrastructure, directory/security best practices
Manage and maintain statewide (enterprise) active directory infrastructure and the highest level (forest) and administrator the following: network schema; domain implementation; forest to forest trusts; active directory capacity planning; support operational guidelines, policies, and procedures for incident and problem management.
Diagnose and resolve production incidents in an analytical and methodical manner.
Maintain and resolve errors in the enterprise active directory environment.
Prepare and present management with reports on system availability and communicate issues and recommended solutions in common terms to non-technical enterprise active directory stakeholders.
Build and maintain partnerships with agency and active directory support clients.
Design new service offers to solve customer requirements or resolve known production issues.
Assist Project Managers by gathering stakeholder active directory business requirements and then develop a comprehensive technical implementation plan.
Required / Desired Skills / Amount of Experience
Required 7 Years: service experience and ability to use Remedy or ServiceNow to manage service requests
Requires 4 Years: In depth knowledge of Active Directory 2012R2 in a multi-site and multi-domain organization, specifically around how identities are maintained in AD
Requires 4 Years: Desire ability to create and manage group Policies including AGPM, administer DNS;
Requires 4 Years: Programming skills needed including PowerShell and how applications authenticate and authorize access independently of the programming language used;
Requires 4 Years: Strong knowledge of the different authentication protocols: Kerberos, LDAP, RADIUS, SAML, OAuth, OpenID Connect;
Requires 4 Years: Experience deploying and maintaining Active Directory Federation Services to enable single sign-on with claim-based applications;
Requires 4 Years: Understanding of what it takes to enable single-sign in a heterogeneous IT environment;
Requires 4 Years: Knowledge and Experience using Azure Multi-Factor Authentication (formerly PhoneFactor);
Requires 4 Years: Networking skills, including firewalls, reverse proxy and VPN access