Information Security Engineer
The Judge Group - Charlotte, NC
Apply NowJob Description
Information Security Engineer - Virtual Directory (RadiantOne) Locations: Charlotte, NC; Chandler, AZ; Phoenix, AZ; Raleigh, NC Position Type: Contingent Resource About the Role We are seeking an Information Security Engineer with deep expertise in virtual directory technologies-specifically RadiantOne FID-to support our Identity and Access Management (IAM) ecosystem. In this role, you will collaborate directly with internal customers, design and enhance virtual directory solutions, and contribute to broader Information Security Engineering initiatives. This position is part of an Agile team responsible for building scalable data-virtualization solutions, enabling secure, unified access to identity data across multiple sources. The ideal candidate is a strong problem solver, a proactive self-starter, and comfortable translating customer needs into technical solutions. Responsibilities Implement, configure, and enhance virtual directory solutions using RadiantOne FID. Build caching and proxy configurations to integrate data across identity silos. Partner with internal customers to gather requirements, assess use cases, and design scalable IAM solutions. Manage ongoing operational work, including responding to ServiceNow incidents, email inquiries, instant messages, and troubleshooting sessions. Monitor system alerts and take corrective actions as needed. Support directory technologies such as RadiantLogic VDS and Oracle Unified Directory (OUD). Participate in data center migration initiatives. Maintain, update, and validate technical documentation. Assist with new customer intake and onboarding processes. Perform ad hoc tasks supporting IAM engineering as needed. Minimum Qualifications 4+ years of Information Security Engineering experience, or equivalent experience through a combination of industry work, consulting, training, military service, or education. Hands-on experience with RadiantOne FID Virtual Directory Technology (required). Strong understanding of LDAP concepts, directory structures, schemas, and query patterns. Experience with SQL (views, joins, lookups) and ETL principles. Experience working in Agile delivery environments. Ability to clearly communicate with internal customers and translate requirements into actionable engineering tasks. Skilled in troubleshooting across directory services, data flows, and integration points. Preferred Qualifications Experience with virtual directory tools such as: Radiant Logic VDS Oracle Unified Directory PingDirectory PingFederate or similar IAM products Working knowledge of PBAC, RBAC, or ABAC authorization models. Familiarity with SIEM platforms (helpful for understanding identity-data aggregation). Proficiency with PowerShell scripting. Strong curiosity, ownership mindset, and ability to independently drive work to completion. Key Skills RadiantOne FID (Must Have) Virtual Directory Architecture LDAP SQL / ETL Concepts PowerShell IAM Fundamentals Customer Interaction & Intake Troubleshooting & Incident Response Candidate Screening Requirement Candidates must record brief video responses to the questions below. (If possible, please include the video link with the candidate submission to TSCC.) Screening Questions What is the difference between a virtual view and a persistent (cached) view? What problem does a virtual directory solve? What is the purpose of the Global Identity Builder (GIB)? What is HDAP in RadiantOne? What is an attribute transform? Through which protocol(s) can Radiant Logic expose virtualized data? What is a join in RadiantOne? Why would you use a persistent cache in RadiantOne? What is a data source connection in RadiantOne? What is the difference between a proxy view and an aggregated view?
Created: 2026-03-10