<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Customer Authentication Engineer - Regions Bank in Cybersecurity Job Openings</title>
    <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Customer-Authentication-Engineer-Regions-Bank/m-p/74348#M397</link>
    <description>&lt;P&gt;2 Openings Available - &lt;A href="https://careers.regions.com/us/en/job/R86842/Customer-Identity-and-Access-Management-CIAM-Engineer" target="_blank" rel="noopener"&gt;Review Full Posting &amp;amp; Compensation Here:&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Job Description&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;At Regions, the Customer Authentication Engineer manages the day-to-day maintenance and operation of Authentication and related security systems to ensure that controls are adequate and effective in protecting the customers, environment, and employees.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Primary Responsibilities&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Performs administration duties for the Identity and Authentication platforms&lt;/LI&gt;&lt;LI&gt;Develops and maintains detailed technical documentation related to the Customer Authentication and Identity platforms including on-premise and cloud-based deployments&lt;/LI&gt;&lt;LI&gt;Serves as support for architecture, support, engineering, and application development issues related to Customer Authentication and Identity&lt;/LI&gt;&lt;LI&gt;Analyzes, troubleshoots, and develops third-party integrations for related authentication and identity tools&lt;/LI&gt;&lt;LI&gt;Assists with establishes plans and protocols to protect data and information systems against unauthorized access, modification, and/or destruction&lt;/LI&gt;&lt;LI&gt;Assists with compiling technical reports on daily activities&lt;/LI&gt;&lt;LI&gt;Analyzes and advises on new authentication technologies and program conformance&lt;/LI&gt;&lt;LI&gt;Maintains knowledge of current and emerging technologies and advancements associated with Omni-channel and Digital Authentication and Identity offerings including Cyber Crime related activities&lt;/LI&gt;&lt;LI&gt;Analyzes security scenarios and provides data-driven solutions and recommendations to management&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Requirements&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Bachelor’s degree and two (2) years of experience in Information Security/Technology&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Or Associate's degree and and four (4) years of experience in Information Security/Technology&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Preferences&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with Agile methodology and SDLC concepts/tools (Git, Atlassian stack)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with cloud-based technologies and environments such as AWS and Azure&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with Linux/Unix, Windows, scripting (with programming languages such as Bash, PowerShell, or Perl), SQL, LDAP, and web services&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with one or more programming languages such as Java, C#, C/C++, Python, or JavaScript&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Ability to articulate complex technical concepts/scenarios to both technical and non-technical audiences&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Familiarity with FIDO, Webauthn, OTP, Biometrics, and multifactor authentication (MFA) platforms&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Financial services experience&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Relevant security certifications (e.g. CISSP, CIAM, etc.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of Active Directory, LDAP, RADIUS, NTLM, Kerberos, and ADFS&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of SAML, OAUTH, OIDC, and JWT&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of TCP/IP network security principles and troubleshooting&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Skills and Competencies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Ability to multi-task, to be self-initiated, and work independently&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Excellent customer service and interpersonal skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Good time management skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Knowledge and skill in technical problem resolution&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong attention to detail and outstanding analytical skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong organizational, research, analytical and/or problem-solving skills to evaluate situations, make recommendations, and take effective action&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong written and verbal communication skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 04 Oct 2024 17:04:58 GMT</pubDate>
    <dc:creator>kristenchaffin</dc:creator>
    <dc:date>2024-10-04T17:04:58Z</dc:date>
    <item>
      <title>Customer Authentication Engineer - Regions Bank</title>
      <link>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Customer-Authentication-Engineer-Regions-Bank/m-p/74348#M397</link>
      <description>&lt;P&gt;2 Openings Available - &lt;A href="https://careers.regions.com/us/en/job/R86842/Customer-Identity-and-Access-Management-CIAM-Engineer" target="_blank" rel="noopener"&gt;Review Full Posting &amp;amp; Compensation Here:&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;Job Description&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;At Regions, the Customer Authentication Engineer manages the day-to-day maintenance and operation of Authentication and related security systems to ensure that controls are adequate and effective in protecting the customers, environment, and employees.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Primary Responsibilities&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Performs administration duties for the Identity and Authentication platforms&lt;/LI&gt;&lt;LI&gt;Develops and maintains detailed technical documentation related to the Customer Authentication and Identity platforms including on-premise and cloud-based deployments&lt;/LI&gt;&lt;LI&gt;Serves as support for architecture, support, engineering, and application development issues related to Customer Authentication and Identity&lt;/LI&gt;&lt;LI&gt;Analyzes, troubleshoots, and develops third-party integrations for related authentication and identity tools&lt;/LI&gt;&lt;LI&gt;Assists with establishes plans and protocols to protect data and information systems against unauthorized access, modification, and/or destruction&lt;/LI&gt;&lt;LI&gt;Assists with compiling technical reports on daily activities&lt;/LI&gt;&lt;LI&gt;Analyzes and advises on new authentication technologies and program conformance&lt;/LI&gt;&lt;LI&gt;Maintains knowledge of current and emerging technologies and advancements associated with Omni-channel and Digital Authentication and Identity offerings including Cyber Crime related activities&lt;/LI&gt;&lt;LI&gt;Analyzes security scenarios and provides data-driven solutions and recommendations to management&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Requirements&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Bachelor’s degree and two (2) years of experience in Information Security/Technology&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Or Associate's degree and and four (4) years of experience in Information Security/Technology&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Preferences&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with Agile methodology and SDLC concepts/tools (Git, Atlassian stack)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with cloud-based technologies and environments such as AWS and Azure&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with Linux/Unix, Windows, scripting (with programming languages such as Bash, PowerShell, or Perl), SQL, LDAP, and web services&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Experience with one or more programming languages such as Java, C#, C/C++, Python, or JavaScript&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Ability to articulate complex technical concepts/scenarios to both technical and non-technical audiences&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Familiarity with FIDO, Webauthn, OTP, Biometrics, and multifactor authentication (MFA) platforms&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Financial services experience&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Relevant security certifications (e.g. CISSP, CIAM, etc.)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of Active Directory, LDAP, RADIUS, NTLM, Kerberos, and ADFS&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of SAML, OAUTH, OIDC, and JWT&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong understanding of TCP/IP network security principles and troubleshooting&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Skills and Competencies&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Ability to multi-task, to be self-initiated, and work independently&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Excellent customer service and interpersonal skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Good time management skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Knowledge and skill in technical problem resolution&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong attention to detail and outstanding analytical skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong organizational, research, analytical and/or problem-solving skills to evaluate situations, make recommendations, and take effective action&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Strong written and verbal communication skills&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 04 Oct 2024 17:04:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cybersecurity-Job-Openings/Customer-Authentication-Engineer-Regions-Bank/m-p/74348#M397</guid>
      <dc:creator>kristenchaffin</dc:creator>
      <dc:date>2024-10-04T17:04:58Z</dc:date>
    </item>
  </channel>
</rss>

