Active Directory Engineer Apply
Job Title: Active Directory Engineer
Location: Irving, TX or Charlotte, NC (3 Days a week Onsite)
Job Type: Contract W2
Looking for an Active Directory Engineer who will be responsible for analysis, design, implementation coordination, and 4th-level escalation support of complex, enterprise-level Active Directory solutions, specifically pertaining to security. This individual will work within the engineering organization, interacting with peer teams and partner groups, scaling, and deploying improvement, consolidation, and migration efforts within the enterprise. The candidate must be able to operate and function well in a geographically dispersed virtual team environment.
Required Skills:
At least 5-10 years of dedicated Active Directory engineering and architecture experience that includes designing, implementing, and maintaining complex enterprise-level (50K+ objects) Active Directory solutions and security models
Overarching broad and deep technical experience with Active Directory Security
Extensive experience and advanced knowledge implementing Windows security concepts and policies, least-privilege design principles
Extensive knowledge of AD Security best-practices, latest security threats/trends and mitigation thereof
Experience with best practices for Active Directory disaster recovery, object management, security models and trust creation
Granular ACE permissions models meeting functional and technical requirements
Deep, in-depth working knowledge of Kerberos and NTLM authentication, MFA, SSO and federation technologies
Extensive and deep knowledge of Group Policy Objects (GPOs), engineering, implementing and 3rd party management solutions thereof
Strong knowledge of LDAP and ability to comfortably construct queries
Working knowledge of Certificate/CA/PKI infrastructure
Excellent communication skills, including proven experience effectively communicating technical challenges and solutions to peers, customers and management
Desired Skills:
Experience with Microsoft's Enhanced Security Architecture Environment (ESAE) - "Red/Bastion/Admin" forest design; including JIT (just in time) JEA (just enough administration) concepts; Microsoft PAM (Privileged Access Manager)
Experience engineering password vaulting solutions (CyberArk, Lieberman, Thycotic, etc.)
PowerShell scripting experience and capabilities
MS SQL/DB knowledge
Microsoft or 3rd party management and monitoring solutions (SCCM, SCOM, VCM, NetIQ GPDH/GPA)
Unix/Linux skills; Vintela VAS integration; RedHat IdM