Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, HPNSK/Tandem, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures.
What Part Will You Play?
Begins to learn how to identify or diagnose failed permissions and access levels for a progressive number of Identity and Access Management (IAM) tools, applications, and technologies by assisting experienced peers. This ensures appropriate access and meets internal/external data security requirements.
Assists with reviewing maintenance reports and violation logs, learning methods of detecting unauthorized access that may be a threat to corporate, client, and team member security.
Assists with security projects to proactively identify and mitigate organizational risk through the delivery of complex IAM solutions to effectively secure resources and data.
Begins to build base knowledge/familiarization while assisting more experienced peers by applying established Standard Operating Procedures, and project change control methodologies.
What Are We Looking For in This Role?
Minimum Qualifications
Bachelors Degree
Relevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experience
Typically No Relevant Experience Required
Must have the ability to pass and maintain a government level security clearance
Preferred Qualifications
Bachelors Degree
Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred
What Are Our Desired Skills and Capabilities?
Relevant experience with Identity and Access Management tools such as OIM (Oracle) OKTA , PING, IBM ITIM, Sailpoint etc.
Should have hands-on experience in access provisioning activity (Manual/Automated)
Experience with any scripting languages like shell scripting, Powershell , VB is a plus
General security knowledge with any vendor specific certification if any
A bachelor degree in engineering, computer
science, information security, or information systems 2-3 years of experience in Identity and Access
Management domain
Experience in managing Identity & Access Management or a similar role within the Identity Access management work environment is desired
IT Services and IT Consulting and Financial Services
What We Offer
About the Company
Searching, interviewing and hiring are all part of the professional life. The TALENTMATE Portal idea is to fill and help professionals doing one of them by bringing together the requisites under One Roof. Whether you're hunting for your Next Job Opportunity or Looking for Potential Employers, we're here to lend you a Helping Hand.
Disclaimer: talentmate.com is only a platform to bring jobseekers & employers together.
Applicants
are
advised to research the bonafides of the prospective employer independently. We do NOT
endorse any
requests for money payments and strictly advice against sharing personal or bank related
information. We
also recommend you visit Security Advice for more information. If you suspect any fraud
or
malpractice,
email us at abuse@talentmate.com.
You have successfully saved for this job. Please check
saved
jobs
list
Applied
You have successfully applied for this job. Please check
applied
jobs list
Do you want to share the
link?
Please click any of the below options to share the job
details.
Report this job
Success
Successfully updated
Success
Successfully updated
Thank you
Reported Successfully.
Copied
This job link has been copied to clipboard!
Apply Job
Upload your Profile Picture
Accepted Formats: jpg, png
Upto 2MB in size
Your application for Identity And Access Management Security Analyst
has been successfully submitted!
To increase your chances of getting shortlisted, we recommend completing your profile.
Employers prioritize candidates with full profiles, and a completed profile could set you apart in the
selection process.
Why complete your profile?
Higher Visibility: Complete profiles are more likely to be viewed by employers.
Better Match: Showcase your skills and experience to improve your fit.
Stand Out: Highlight your full potential to make a stronger impression.
Complete your profile now to give your application the best chance!