Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Some similar recruitments
Identity & Access Management Analyst (Hybrid/Remote)
Recruited by University of Massachusetts Amherst 9 months ago Address , Amherst, 01003
Identity And Access Management - Operations Manager
Recruited by Sentara Healthcare 9 months ago Address , Virginia Beach, 23455, Va $112,756 - $209,414 a year
Identity Intelligence Analyst Jobs
Recruited by Office of the Director of National Intelligence 10 months ago Address McLean, VA, United States
Identity & Access Management Developer (Remote Worker Opening)
Recruited by BAE Systems 1 year ago Address , Falls Church, 22042, Va

Identity Access Management (Iam) (Governance Analyst 3) – Contract Position

Company

BranCore Technologies

Address , Richmond, 23219, Va
Employment type CONTRACTOR
Salary
Expires 2023-06-10
Posted at 1 year ago
Job Description
Contract Length: 1 year with the possibility of extending based on performance.
Local candidate only or candidates willing to drive to client site.
Fully Remote.
Description: The role of an identity and access management analyst is to work with
various departments within an organization to help drive access control initiatives
in support of internal policies, regulatory compliance, and industry standards. The
IAM analyst role typically provides IAM expertise and guidance to various
business units and works closely with IT and cybersecurity groups to gather
identity and access management requirements to design and implement access
controls across all systems in support of IT and cybersecurity strategies.
Responsibility
IAM Analyst Technical skills
The technical skills required for an IAM analyst job include the following:
1. Familiarity with multiple operating systems (Linux, Windows, etc.)
2. Strong understanding of directory services (LDAP, Active Directory, etc.)
3. In-depth knowledge of security protocols (SSH, TLS, etc.)
4. Proficient in at least one scripting language (Python, Ruby, etc.)
5. Experience with IAM tools (Okta, Ping Identity, etc.)
6. Strong analytical and problem-solving skills.
7. Excellent verbal and written communication skills.
8. Detail-oriented and able to work independently.
9. Flexible and able to adapt to changing needs.
10. Team player with a positive attitude.
The IAM analyst’s role is to support the organization’s identity and access
management program. Here are common tasks listed in an IAM analyst job
description:
  • Administer user accounts and access privileges in the organization’s
  • Lead the IAM project initiatives for over 100+ applications
identity management system.
  • Work closely with the IAM team to ensure that the right people have
access to the right resources.
  • Responsible for the day-to-day administration of the IAM system.
  • Work with internal customers, business analysts, and application
  • Involved in troubleshooting and resolving IAM issues.
teams to understand access requirements.
  • Participate in IAM audits and review access control reports to identify
  • Maintain documentation for the IAM program.
potential risks.
  • Provide training to new users on the IAM system.
  • Update and maintain the IAM system according to changes in the
organization’s business needs.
The duties of an IAM analyst may include the following:
  • Managing user accounts and permissions in the identity and access
management system.
  • Granting or denying access to company resources based on user role
and privileges.
  • Creating and managing user groups in the identity and access
management system.
  • Enforcing company policies and procedures related to identity and
access management.
  • Monitoring user activity in the identity and access management
system.
  • Identifying and addressing identity and access management issues.
  • Working with the IAM team to resolve identity and access
  • Reporting on identity and access management system activity.
management problems.
  • Maintaining up-to-date knowledge of identity and access
management best practices.
  • Documenting IAM processes and procedures.
Below is a list of job expectations from an IAM analyst role:
1. Be able to provide clear and concise reports to upper management on the
status of IAM within the organization.
2. Understand and be able to articulate the company’s IAM strategy.
3. Be able to develop IAM metrics and KPIs to track progress and measure
success.
4. Understand the various IAM tools and technologies available and be able
to recommend solutions that will meet the company’s needs.
5. Be able to lead IAM projects from start to finish, including developing
project plans, coordinating resources, and managing timelines
6. Be able to troubleshoot IAM issues and develop creative solutions to solve
problems.
7. Have a strong understanding of security concepts and how they apply to
IAM.
8. Be able to develop and deliver IAM training to both technical and nontechnical staff.
9. Be able to research and stay up-to-date on IAM trends and best practices.
10. Work effectively with other IT team members to ensure that IAM
solutions are integrated seamlessly into the overall IT infrastructure.
Types of Reports Prepared by an IAM Analyst
1. Access Request Report –
This report details all access requests made by users in the organization. You
should include information such as the date of the request, the user’s name and
department, the type of access requested, and whether or not the request was
approved.
2. User Provisioning Report –
This report details all user provisioning activities within the organization. You
should include information such as the date of the provisioning, the user’s name
and department, the type of access provisioned, and whether or not the
provisioning was successful.
3. Audit Report –
This report details all IAM-related audits that have been conducted within the
organization. You should include information such as the date of the audit, the type
of audit performed, the audit’s scope, and the audit’s findings.
4. IAM Strategy Report –
This report provides an overview of the company’s IAM strategy, including the
goals and objectives of the strategy, the tools and technologies that will be used,
the timeline for implementation, and the budget for the project.
5. User Authentication Report –
This report details all user authentication activities within the organization. You
should include information such as the date of the authentication, the user’s name
and department, the type of authentication used, and whether or not the
authentication was successful. Failed authentication attempts are also reported
and investigated to prevent a potential breach.
6. Password Reset Report –
This report details all password reset activities within the organization. You should
include information such as the date of the reset, the user’s name and department,
and whether or not the reset was successful.
7. Authorization Report –
This report details all authorization activities within the organization. You should
include information such as the date of the authorization, the user’s name and
department, the type of authorization requested, and whether or not the
authorization was approved.