We have a 6 month contract opportunity for a Cloud IAM Developer. This role is fully Remote but must work CST business hours.
Job Summary:
We are seeking a highly skilled Cloud IAM Developer to join our Information Security team. This role is crucial for managing and automating user, group, and permission configurations within our cloud infrastructure. The ideal candidate will have extensive experience with Google Cloud Platform (GCP), Google Workspace, and Terraform, and will be responsible for developing custom automation solutions to address business needs around data access management.
Key Responsibilities:
- Understand Business Needs: Gain a deep understanding of the problems and opportunities related to managing users, groups, and permissions for data access.
- Develop Automation Solutions: Build custom automation solutions for managing users, groups, and permissions using Google APIs and Terraform.
- Collaborate with Teams: Work closely with the Cloud Identity Access Management (IAM) team and Data Governance team to address a large backlog of requests.
- Manage Data Access Groups (DAGs): Create and provision DAGs for existing and new datasets through automation.
- Manage User Access Groups (UAGs): Automate the creation and management of UAGs for various teams and users.
- Tool Access Group (TAG) Management: Create and provision TAGs and integrate them with UAGs.
- Group Remediation: Automate the removal of users from DAGs, TAGs, and legacy groups.
- Integration with Collibra and Sailpoint IIQ: Ensure seamless integration for user access requests and privileged account management.
- Support IDEAS-specific Access Requests: Fulfill unique data access and tool access needs with a maximum 5-business-day SLA.
- Daily Group Membership Data: Maintain a reliable, automated pipeline from Google Workspace to GCP.
- Build Automation: Create and manage Google Workspace groups and users needed for data access from ad-hoc spreadsheets and standard request processes.
- Configure Data Access Permissions: Build automation to configure data access permissions for groups in GCP, both from ad-hoc spreadsheets and inside data engineering pipelines with Terraform.
Required Skills:
- 5+ years of experience working as a Software Engineer, Developer, or Data Engineer.
- Proficiency with Google Workspace.
- Proficiency with Google Cloud APIs.
- Proficiency with GCP IAM Administration.
- Proficiency with Terraform development.
- Proficiency with implementing automation through Python, Java, or PHP.
- Proficiency with REST API development.
- Experience with Sailpoint IdentityIQ (IIQ).
Preferred Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Mathematics, or a related field, or equivalent work experience.
- Experience working in a healthcare environment.
- Intermediate/advanced knowledge of backend database configuration and processes.
- Flexible and open to new ideas with the ability to understand things from corporate, regional, and local perspectives while maintaining customer focus.
- Proven ability to work in an ambiguous environment; self-motivated to work independently and collaboratively.
- Ability to build strong relationships with peers and leaders by building trust and credibility; strong collaboration skills.
- Active listening skills to understand business needs and steer the business team to take decisions that have enterprise-wide impact.
- Effectively influence a team of individuals without reporting authority to achieve goals and meet deadlines.
location: Warren, Michigan
job type: Contract
salary: $68 - 73 per hour
work hours: 8am to 4pm
education: Bachelors
responsibilities:
- Understand Business Needs: Gain a deep understanding of the problems and opportunities related to managing users, groups, and permissions for data access.
- Develop Automation Solutions: Build custom automation solutions for managing users, groups, and permissions using Google APIs and Terraform.
- Collaborate with Teams: Work closely with the Cloud Identity Access Management (IAM) team and Data Governance team to address a large backlog of requests.
- Manage Data Access Groups (DAGs): Create and provision DAGs for existing and new datasets through automation.
- Manage User Access Groups (UAGs): Automate the creation and management of UAGs for various teams and users.
- Tool Access Group (TAG) Management: Create and provision TAGs and integrate them with UAGs.
- Group Remediation: Automate the removal of users from DAGs, TAGs, and legacy groups.
- Integration with Collibra and Sailpoint IIQ: Ensure seamless integration for user access requests and privileged account management.
- Support IDEAS-specific Access Requests: Fulfill unique data access and tool access needs with a maximum 5-business-day SLA.
- Daily Group Membership Data: Maintain a reliable, automated pipeline from Google Workspace to GCP.
- Build Automation: Create and manage Google Workspace groups and users needed for data access from ad-hoc spreadsheets and standard request processes.
- Configure Data Access Permissions: Build automation to configure data access permissions for groups in GCP, both from ad-hoc spreadsheets and inside data engineering pipelines with Terraform.
qualifications:
- Experience level: Experienced
- Minimum 8 years of experience
- Education: Bachelors
skills:
Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.
At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com.
Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad Digital offers a comprehensive benefits package, including health, an incentive and recognition program, and 401K contribution (all benefits are based on eligibility).
This posting is open for thirty (30) days.
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.