DE Jobs

Search from over 2 Million Available Jobs, No Extra Steps, No Extra Forms, Just DirectEmployers

Job Information

Eaton Corporation Specialist - Identity and Access Management - CyberSecurity in Pittsburgh, Pennsylvania

Eaton’s Information Technology division is currently seeking a Specialist - Identity and Access Management - Cybersecurity to join our team. This position can be based at any Eaton office location in the U.S. The position is eligible for a hybrid work setup.

The expected annual salary range for this role is $105,000 - $154,000 a year.

Please note the salary information shown above is a general guideline only. Salaries are based upon candidate skills, experience, and qualifications, as well as market and business considerations.

What you’ll do:

Build, deliver, maintain, and update technology, platform and system solutions in Eaton's Identity and Access Management space that addresses business and technical requirements, leveraging standard principles and patterns. Focused on delivering, maintaining, and updating Identity and Access Management systems with a targeted focus on the Saviynt platform.

  • Provides subject matter expertise to and lead platform and system design, development, and implementation

  • Leads overall effort and works with resources across functions to deliver technology, platform and system solutions to meet customer requirements, providing solution options, making recommendations and highlighting operational or security risks, as well as providing alternative options.

  • Defines tuning and configuration parameters/settings for technologies, platforms and systems to meet customer and operational requirements

  • Leads lifecycle management activities for technology, platform, systems and related documentation to ensure operational health and security.

  • Monitors technology, platform and systems to ensure required performance, availability, and capacity. Identifies and eliminates gaps in monitoring and potential impact on service delivery.

  • Post-design configurations, advanced debugging and troubleshooting of issues, including interacting with technology vendors.

  • Continuously seeks to more efficiently manage and utilize technology, platform and systems.

Qualifications:

Basic Qualifications:

• Associates degree from an accredited institution

• Minimum of 5 years in Cybersecurity or a graduate of Eaton’s Leadership Development Program

• Must be legally authorized to work in the United States without company sponsorship now or in the future.

• No relocation benefit is being offered for this position. Only candidates within a 50-mile radius of any Eaton site in the United States will be considered. Active-Duty Military Service member candidates are exempt from the geographical area limitation.

• This position requires use of information or access to hardware which is subject to the International Traffic in Arms Regulations (ITAR). All applicants must be U.S. persons within the meaning of ITAR. ITAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. 'Green Card Holder'), Political Asylee, or Refugee.

Preferred Qualifications:

• Bachelors degree from an accredited institution

• Experience in Identity and Access Management solutions and technologies

• Experience with any modern IGA solutions (Saviynt EIC is preferred) , including onboarding and troubleshooting enterprise-scale application integrations and Privileged Access Management best practices.

• Experience in designing and implementing Identity Governance and Administration (IGA) or Privileged Access Management (PAM) solutions with a preference for proficiency in SailPoint, Saviynt CPAM, CyberArk, or equivalent PAM systems.

• Experience with Active Directory administration and familiarity with domain/forest topology

• Experience with Linux administration, Windows administration and security concepts

Skills:

• Designing and implementing Identity Governance and Administration (IGA) or Privileged Access Management (PAM) solutions

• Developing integrations between PAM and IGA solutions

• Secrets Management best practices

• Managing database credentials (Oracle & MS SQL)

• Managing Privileged Accounts and APIs in Cloud Providers (Azure, AWS, GCP)

We are committed to ensuring equal employment opportunities for job applicants and employees. Our recruitment processes use balanced selection criteria and avoid unlawful discrimination against applicants on the basis of their age, colour, disability, marital status, national origin, gender, gender identity, genetic information, race or racial origin, religion, sexual orientation or any other status protected or required by law.

DirectEmployers