Negotiable
Outside
Remote
USA
Summary: The role of Sr RACF Consultant involves working on a long-term project requiring expertise in TKE, RACF, z/OS, storage, and Db2. The position is primarily remote, with occasional travel to the client's site in Dallas, TX. The consultant will be responsible for implementing and managing security policies using IBM's RACF software. An immediate start is required for this position, which is classified as outside IR35.
Key Responsibilities:
- Implement and manage Resource Access Control Facility (RACF) security policies.
- Ensure user identification and verification through authentication processes.
- Classify and protect system resources while maintaining access rights.
- Control access to protected resources and log access for auditing purposes.
- Provide expertise in TKE, RACF, z/OS, storage, and Db2.
Key Skills:
- Experience with TKE, RACF, and z/OS.
- Knowledge of storage and Db2.
- Strong understanding of security policies and access control mechanisms.
- Ability to work remotely and travel occasionally.
- Experience in implementing auditing functions.
Salary (Rate): undetermined
City: undetermined
Country: USA
Working Arrangements: remote
IR35 Status: outside IR35
Seniority Level: undetermined
Industry: IT
We're seeking for a Sr RACF Consultant for our direct client. Please review the below job Description and revert with your interest for the same.
Job details:
Role: Sr RACF Consultant
Long term project >12 months
ASAP Start
REMOTE
May need to on rare occasions travel to site. Client is in Dallas, TX.
Must have TKE experience and also worked with RACF and z/OS, as well as storage and Db2.
Resource Access Control Facility (RACF) is an IBM software security product that provides access control and auditing functions for the z/OS and z/VM operating systems. RACF was introduced in 1976. Originally called RACF it was renamed to z/OS Security Server (RACF), although many mainframe professionals still refer to it as RACF.
Its main features are:
- Identification and verification of a user via user id and password check (authentication)
- Identification, classification, and protection of system resources
- Maintenance of access rights to the protected resources (access control)
- Controlling the means of access to protected resources
- Logging of accesses to a protected system and protected resources (auditing)
RACF establishes security policies rather than just permission records. It can set permissions for file patterns that is, set the permissions even for files that do not yet exist. Those permissions are then used for the file (or other object) created at a later time.