Overview
Remote
Up to $70
Contract - W2
Contract - 12 Month(s)
Skills
ACF2 security administration
ACF2
SME
NEXTKEYS
UID
ACF2 security
XREF
X-ROL
Job Details
Req No: 140327
Role: Security Specialist
Position Location: Remote
Duration: 12 months (C2H -W2)
Summary:
Responsible for identifying and correcting a variety of data management issues.
Job Responsibilities:
Set up, update and maintain securities in all asset classes (fixed income products, equities, options, OTC derivatives, etc.) in proprietary and third-party operations and accounting systems.
Initiate and maintain reference data on securities and issuers.
Create reports and control checks to correct security data in firm trading systems.
Respond to inquiries related to security master functions.
Diagnose data exceptions, recommend, and develop controls to ensure accuracy.
Maintain security master data (security reference, derived, fundamental, and analytic data) and workflows associated with maintaining the data.
Applies security concepts, reviews information, executes defined tasks, analyzes requirements, reviews logs, and creates documentation.
Performs investigation and data loss prevention, data manipulation, and coordination of activities.
Performs actions to address or mitigate risks and vulnerabilities.
Reviews and defines controls.
Advises on less complex security procedures and products for clients, security administrators and network operations.
Participates in enforcement of control security risks and threats.
Conducts security assessments and other information security routines consistently, with supervision.
Skills:
A strong knowledge of products including bonds, CDS, leveraged loans, and equities.
Basic familiarity with capital structures and issuer relationships, debt guarantees, and corporate actions / succession events. Familiarity with investment data sources; i.e. Bloomberg, Paladyne, Markit.
Strong Microsoft Excel skills; working knowledge of the Bloomberg Excel API preferred.
Knowledge of system integrity, data validation, Order Management Systems, and the ability to communicate well.
Job Responsibilities:
Set up, update and maintain securities in all asset classes (fixed income products, equities, options, OTC derivatives, etc.) in proprietary and third-party operations and accounting systems.
Initiate and maintain reference data on securities and issuers.
Create reports and control checks to correct security data in firm trading systems.
Respond to inquiries related to security master functions.
Diagnose data exceptions, recommend, and develop controls to ensure accuracy.
Maintain security master data (security reference, derived, fundamental, and analytic data) and workflows associated with maintaining the data.
Applies security concepts, reviews information, executes defined tasks, analyzes requirements, reviews logs, and creates documentation.
Performs investigation and data loss prevention, data manipulation, and coordination of activities.
Performs actions to address or mitigate risks and vulnerabilities.
Reviews and defines controls.
Advises on less complex security procedures and products for clients, security administrators and network operations.
Participates in enforcement of control security risks and threats.
Conducts security assessments and other information security routines consistently, with supervision.
Skills:
A strong knowledge of products including bonds, CDS, leveraged loans, and equities.
Basic familiarity with capital structures and issuer relationships, debt guarantees, and corporate actions / succession events. Familiarity with investment data sources; i.e. Bloomberg, Paladyne, Markit.
Strong Microsoft Excel skills; working knowledge of the Bloomberg Excel API preferred.
Knowledge of system integrity, data validation, Order Management Systems, and the ability to communicate well.
Roles and Responsibilities:
Security Administration is specific to ACF2 - Other than training on OIM, mainframe naming conventions and standards for the rules and userIds, the candidate will be analyzing ACF2 access reports for an application in order to board the access to our Identity tool, OIM. The candidate must be able to talk to the stake holders about the access in place and start the conversation about how to find user/access commonalities and how they can be boarded to oim via entitlements.
Must Have Technical Skills:
- Strong senior level knowledge of ACF2 Mainframe rule administration which includes redesigning application rulekey structure. This encompasses creating and collapsing multiple NEXTKEYS for each application.
- Strong understanding of ACF2 access validation workflow for dataset and resource rules. This is needed when converting the access from UID to ROLE.
- Strong understanding of masking characters when utilized for both rules and userIds.
- Microsoft Office Excel and Word
** Essentially we are redesigning the ACF2 security from UID to ROLE. It is extremely important that they have the ACF2 administration skills.
Flex Skills/Nice to Have: n/a
Soft Skills: Great time management skills, project oriented, good communication both written and verbal, strong executive presence with stakeholders
no degree required - looking for experience
Screening Questions:
Do you have senior level knowledge of ACF2 security administration (5+ years experience) for dataset and resource rules?
Do you have experience analyzing rules, splitting rulekeys, building new rulekeys and testing them for successful authorization?
Do you have experience with creating and collapsing nextkeys?
Do you have experience creating Cross-Reference Groups (XREF,X-ROL) and how they are utilized within the rules?
Do you have sufficient understanding and extensive working knowledge of ACF2 s Administration Security structure to discuss details with Application Stakeholders regarding ACF2 access to their application?
Security Administration is specific to ACF2 - Other than training on OIM, mainframe naming conventions and standards for the rules and userIds, the candidate will be analyzing ACF2 access reports for an application in order to board the access to our Identity tool, OIM. The candidate must be able to talk to the stake holders about the access in place and start the conversation about how to find user/access commonalities and how they can be boarded to oim via entitlements.
Must Have Technical Skills:
- Strong senior level knowledge of ACF2 Mainframe rule administration which includes redesigning application rulekey structure. This encompasses creating and collapsing multiple NEXTKEYS for each application.
- Strong understanding of ACF2 access validation workflow for dataset and resource rules. This is needed when converting the access from UID to ROLE.
- Strong understanding of masking characters when utilized for both rules and userIds.
- Microsoft Office Excel and Word
** Essentially we are redesigning the ACF2 security from UID to ROLE. It is extremely important that they have the ACF2 administration skills.
Flex Skills/Nice to Have: n/a
Soft Skills: Great time management skills, project oriented, good communication both written and verbal, strong executive presence with stakeholders
no degree required - looking for experience
Screening Questions:
Do you have senior level knowledge of ACF2 security administration (5+ years experience) for dataset and resource rules?
Do you have experience analyzing rules, splitting rulekeys, building new rulekeys and testing them for successful authorization?
Do you have experience with creating and collapsing nextkeys?
Do you have experience creating Cross-Reference Groups (XREF,X-ROL) and how they are utilized within the rules?
Do you have sufficient understanding and extensive working knowledge of ACF2 s Administration Security structure to discuss details with Application Stakeholders regarding ACF2 access to their application?
Microsoft Office Excel and Word | Yes | 4 - 6 Years | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Strong senior level knowledge of ACF2 Mainframe rule administration which includes redesigning application rulekey structure. This encompasses creating and collapsing multiple NEXTKEYS for each application. | Yes | 4 - 6 Years | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Strong understanding of ACF2 access validation workflow for dataset and resource rules. This is needed when converting the access from UID to ROLE. | Yes | 4 - 6 Years | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Strong understanding of masking characters when utilized for both rules and userIds. | Yes | 4 - 6 Years |
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.