About The Position

We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more – in our careers and in our communities. Job Description Summary: The Cybersecurity Identity Access Management (IAM) Analyst will report to the Cybersecurity Functional Leader and will not have direct reports. They are responsible for serving as a security expert within their respective cybersecurity specialty, applying their extensive knowledge to implement applications and technology. The Cybersecurity IAM Analyst collaborates closely with Cybersecurity Engineers, business analysts, architects, vendor partners, and other teams within the IT organization to ensure the security of complex applications and services. This role is tasked enforcing security controls for applications or service architectures, which safeguard the integrity and security of the application environment. Additionally, the Cybersecurity IAM Analyst will maintain daily operations, assist with assigned project work, conduct design reviews, analyze results, and provide recommendations to deliver quality products. The Cybersecurity IAM Analyst analyzes user access needs, develop access roles and add/change/delete user access accordingly, through provisioning tool(s) or directly in system / application. Assist in special projects, such as application go-lives, upgrades, enhancements, etc. As a High Reliability Organization (HRO), responsibilities require focus on safety, quality and efficiency in performing job duties. The job profile provides an overview of responsibilities and duties and is not intended to be an exhaustive list and is subject to change at any time

Requirements

  • Bachelor's Degree: Computer and Information Science
  • Degree, or equivalent experience Field of Study/Experience: Computer Science, Information Systems, Mathematics, or Engineering
  • 1+ years of experience in or supporting Identity and Access Management
  • 1+ years of experience with Active Directory
  • Experience administering and building new security roles, classes and / or rules within an IAM tool and / or appropriate system(s) or application(s) based on customer needs and compliance approval; maintain documentation accordingly.
  • Understanding of IAM concepts, technologies, and frameworks.
  • Hands-on experience with IAM tools and platforms.
  • Proficiency in SQL and PowerShell for querying and manipulating identity-related data.
  • Excellent problem-solving and analytical skills, with the ability to think critically and make sound decisions.
  • Strong communication and collaboration skills, with the ability to work effectively with cross-functional teams.
  • Assist with vendor relationships and any evaluation or recommendations related to new vendors and technologies.
  • Collaborate with cybersecurity team to investigate and mitigate IAM-related security incidents.
  • Oversee the support and operations of Privileged Access Management solutions and Remote Access.
  • Establish and enforce IAM governance policies to ensure compliance with security standards and regulatory requirements.
  • An understanding of IAM principles, strong technical skills, and a passion for delivering high-quality security solutions.

Nice To Haves

  • Is adaptable to new technology.
  • Forward-thinking, with ability to be strategic when looking at future technology.
  • Possesses a continuous-learner mindset.
  • Demonstrated ability to work well with others.
  • Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP).
  • Experience with SailPoint and NERM.
  • Understanding of User provisioning and maintenance in EPIC.
  • Experience with identity governance, SSO, SAML and, MFA.
  • Familiarity with scripting and automation tools (e.g., PowerShell, Azure Automation, SQL).
  • Experience with Privileged Management, Entra ID, Remote Access solutions, Certificate management and Identity Governance solutions.

Responsibilities

  • Operational Support – Serves as a technical expert related to the security processes, applications and solutions. This support will complement the other support services within the organization.
  • Security Expertise - Serves as the technical expert for Cybersecurity principles spanning Cybersecurity use cases. Applies security knowledge to identify and assess risk, develop create and secure solutions to protect enterprise data and systems. Adapts to new and emerging technologies.
  • Collaboration - Works with architects, Business Analysts, Product Owners and peers providing technical expertise of current security controls to ensure compliance to our security standards.
  • Technical Documentation - Creates, reviews, and approves technical documentation for applications supported and providing specifications for vendors.
  • Research and Analysis - Analyzes, plans, justifies, schedules, and coordinates the implementation and maintenance of the specialty area’s administrative, operational, and financial initiatives including TCO, optimization, and efficiency.
  • Technology Strategy - Support development of technology strategies and roadmaps within a given area of specialty including design, documentation, communication, and implementation of new or existing standards for infrastructure technologies while remaining current on industry trends.
  • Leads Initiatives - Guides teams through technical issues and challenges. Assist with technology changes to deliver security and secure business outcomes while also virtually leveraging subject matter experts from any other needed technical area. Oversees, or consults on, technology implementation and modification activities (for example, projects and products), particularly for new or shared solutions.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service