Job Description:
We are looking for a highly skilled Active Directory L3 Engineer with over 10 years of extensive experience in Active Directory management and design. The ideal candidate will have in-depth knowledge of ADFS, LDAP, Group Policy Objects (GPO), Multi-Factor Authentication (MFA), and integration with Azure Active Directory.
Key Responsibilities:
- Design and implement robust Active Directory architecture and solutions tailored to business needs.
- Manage, configure, and maintain ADFS, LDAP, and GPO across the organization.
- Deploy and support Multi-Factor Authentication solutions to enhance security.
- Lead the integration of Azure Active Directory with on-premises Active Directory systems.
- Troubleshoot and resolve complex issues related to Active Directory, ensuring high availability and performance.
- Conduct security assessments and enforce best practices to ensure compliance and security of AD environments.
- Document architectural designs, processes, and configurations for Active Directory and related services.
- Mentor and provide technical guidance to junior engineers and support staff.
Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, or a related field.
- 10+ years of hands-on experience with Active Directory, including ADFS, LDAP, GPO, and MFA.
- Proven experience in designing and architecting Active Directory solutions, including integration with Azure AD.
- Strong understanding of Active Directory security, policies, and best practices.
- Proficiency in scripting languages (e.g., PowerShell) for automation and management of AD tasks.
- Excellent analytical and troubleshooting skills, with a proactive approach to problem-solving.
- Strong communication and collaboration skills, with the ability to work effectively in a team environment.
Preferred Skills:
- Experience with identity and access management solutions beyond Active Directory.
- Relevant Microsoft certifications (e.g., Microsoft Certified: Azure Administrator, Microsoft Certified: Identity and Access Administrator).