Description Position Overview: Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards. Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets. Create and maintain detailed IAM system and workflow documentation based on business and technical requirements. Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services. Develop, execute, and document test cases to validate IAM workflow enhancements and system changes. Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories. Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives. Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents. Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations. Participate in on-call rotation as needed to support critical IAM functions and operational continuity. Job Description Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur. Job Responsibility Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Entry Level
Number of Employees
5,001-10,000 employees