360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one’s business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel’s through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization’s needs. Take a shot at us for your IT requirements and experience a radical change.
The Governor’s Office of Information Technology Identity and Access Management (IAM) work unit is responsible for how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization. The IAM analyst will be responsible for updating accounts on the Active Directory domain to include proper role based access, organization unit, titles, office, department, and manager. The analyst will work closely with Manager of IAM, OIT Project Manager, IAM team and other stakeholders. The analyst will be responsible for making sure access, provisioning documentation, attribute mapping, and auditing updated and communicated.
In addition to those responsibilities listed above, the IAM analyst may be required to:
● create and populate additional fields within Active Directory and other systems
● modify and populate existing fields within Active Directory and other systems
● participate in project planning sessions
● perform user testing
● communicate and/or prepare information for audits
Cooperative agreement:
This position facilitates identity and access management. The position is liable for ensuring that customer requests for security access is completed in a timely manner, provides second level technical support to the project team, end users and OIT functional groups. This position will perform ticket management and participate in project meetings. It is the responsibility of the IAM analyst to manage Identity and access within CA Service Desk, Customer Portal (EEM), Active Directory and Google.
Qualifications:
The Identity and Access Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk, and Google. Due to the importance of this position, it is expected that a person supporting IAM has basic troubleshooting skills with networking and computer systems, can multitask, work in a fast paced environment while providing excellent customer service.
Terms and Conditions:
As a condition of employment you may be required to submit to additional background checks and/or screenings during the course of your employment with OIT.
CYBER SECURITY
Contract staff is required to observe the Colorado Cyber Security Policies, as published and updated by the Office of Cyber Security. These policies provide guidelines concerning vendor security controls and vendor reporting and monitoring. Please reference Policy P-CCSP-005 concerning vendor management.
Thanks and Regards,
Isha Sharma
408-766-0000 EXT 425