Unfortunately, this job posting is expired.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Don't worry, we can still help! Below, please find related information to help you with your job search.
Related keywords
- Identity Access Management Analyst
- Identity Access Management Project Manager
- Identity Access and Management SME
- Identity Access Management okta consultant
- Identity Access Analyst
- Access Identity Management Engineer
- Identity Access Management Sales Executive
- Identity Access Management Consultant
- Identity Access Management Data Analyst
- Identity And Access Management Manager
Some similar recruitments
Identity & Access Management Analyst (Hybrid/Remote)
Recruited by University of Massachusetts Amherst 9 months ago
Address , Amherst, 01003
Identity And Access Management - Operations Manager
Recruited by Sentara Healthcare 9 months ago
Address , Virginia Beach, 23455, Va
$112,756 - $209,414 a year
Identity Intelligence Analyst Jobs
Recruited by Office of the Director of National Intelligence 10 months ago
Address McLean, VA, United States
Identity & Access Management Developer (Remote Worker Opening)
Recruited by BAE Systems 1 year ago
Address , Falls Church, 22042, Va
Identity Access Management (Iam) (Governance Analyst 3) – Contract Position
Company | BranCore Technologies |
Address | , Richmond, 23219, Va |
Employment type | CONTRACTOR |
Salary | |
Expires | 2023-06-10 |
Posted at | 1 year ago |
Contract Length: 1 year with the possibility of extending based on performance.
Local candidate only or candidates willing to drive to client site.
Fully Remote.
Description: The role of an identity and access management analyst is to work with
various departments within an organization to help drive access control initiatives
in support of internal policies, regulatory compliance, and industry standards. The
IAM analyst role typically provides IAM expertise and guidance to various
business units and works closely with IT and cybersecurity groups to gather
identity and access management requirements to design and implement access
controls across all systems in support of IT and cybersecurity strategies.
Responsibility
IAM Analyst Technical skills
The technical skills required for an IAM analyst job include the following:
1. Familiarity with multiple operating systems (Linux, Windows, etc.)
2. Strong understanding of directory services (LDAP, Active Directory, etc.)
3. In-depth knowledge of security protocols (SSH, TLS, etc.)
4. Proficient in at least one scripting language (Python, Ruby, etc.)
5. Experience with IAM tools (Okta, Ping Identity, etc.)
6. Strong analytical and problem-solving skills.
7. Excellent verbal and written communication skills.
8. Detail-oriented and able to work independently.
9. Flexible and able to adapt to changing needs.
10. Team player with a positive attitude.
The IAM analyst’s role is to support the organization’s identity and access
management program. Here are common tasks listed in an IAM analyst job
description:
The duties of an IAM analyst may include the following:
1. Be able to provide clear and concise reports to upper management on the
status of IAM within the organization.
2. Understand and be able to articulate the company’s IAM strategy.
3. Be able to develop IAM metrics and KPIs to track progress and measure
success.
4. Understand the various IAM tools and technologies available and be able
to recommend solutions that will meet the company’s needs.
5. Be able to lead IAM projects from start to finish, including developing
project plans, coordinating resources, and managing timelines
6. Be able to troubleshoot IAM issues and develop creative solutions to solve
problems.
7. Have a strong understanding of security concepts and how they apply to
IAM.
8. Be able to develop and deliver IAM training to both technical and nontechnical staff.
9. Be able to research and stay up-to-date on IAM trends and best practices.
10. Work effectively with other IT team members to ensure that IAM
solutions are integrated seamlessly into the overall IT infrastructure.
Types of Reports Prepared by an IAM Analyst
1. Access Request Report –
This report details all access requests made by users in the organization. You
should include information such as the date of the request, the user’s name and
department, the type of access requested, and whether or not the request was
approved.
2. User Provisioning Report –
This report details all user provisioning activities within the organization. You
should include information such as the date of the provisioning, the user’s name
and department, the type of access provisioned, and whether or not the
provisioning was successful.
3. Audit Report –
This report details all IAM-related audits that have been conducted within the
organization. You should include information such as the date of the audit, the type
of audit performed, the audit’s scope, and the audit’s findings.
4. IAM Strategy Report –
This report provides an overview of the company’s IAM strategy, including the
goals and objectives of the strategy, the tools and technologies that will be used,
the timeline for implementation, and the budget for the project.
5. User Authentication Report –
This report details all user authentication activities within the organization. You
should include information such as the date of the authentication, the user’s name
and department, the type of authentication used, and whether or not the
authentication was successful. Failed authentication attempts are also reported
and investigated to prevent a potential breach.
6. Password Reset Report –
This report details all password reset activities within the organization. You should
include information such as the date of the reset, the user’s name and department,
and whether or not the reset was successful.
7. Authorization Report –
This report details all authorization activities within the organization. You should
include information such as the date of the authorization, the user’s name and
department, the type of authorization requested, and whether or not the
authorization was approved.
Local candidate only or candidates willing to drive to client site.
Fully Remote.
Description: The role of an identity and access management analyst is to work with
various departments within an organization to help drive access control initiatives
in support of internal policies, regulatory compliance, and industry standards. The
IAM analyst role typically provides IAM expertise and guidance to various
business units and works closely with IT and cybersecurity groups to gather
identity and access management requirements to design and implement access
controls across all systems in support of IT and cybersecurity strategies.
Responsibility
IAM Analyst Technical skills
The technical skills required for an IAM analyst job include the following:
1. Familiarity with multiple operating systems (Linux, Windows, etc.)
2. Strong understanding of directory services (LDAP, Active Directory, etc.)
3. In-depth knowledge of security protocols (SSH, TLS, etc.)
4. Proficient in at least one scripting language (Python, Ruby, etc.)
5. Experience with IAM tools (Okta, Ping Identity, etc.)
6. Strong analytical and problem-solving skills.
7. Excellent verbal and written communication skills.
8. Detail-oriented and able to work independently.
9. Flexible and able to adapt to changing needs.
10. Team player with a positive attitude.
The IAM analyst’s role is to support the organization’s identity and access
management program. Here are common tasks listed in an IAM analyst job
description:
- Administer user accounts and access privileges in the organization’s
- Lead the IAM project initiatives for over 100+ applications
- Work closely with the IAM team to ensure that the right people have
- Responsible for the day-to-day administration of the IAM system.
- Work with internal customers, business analysts, and application
- Involved in troubleshooting and resolving IAM issues.
- Participate in IAM audits and review access control reports to identify
- Maintain documentation for the IAM program.
- Provide training to new users on the IAM system.
- Update and maintain the IAM system according to changes in the
The duties of an IAM analyst may include the following:
- Managing user accounts and permissions in the identity and access
- Granting or denying access to company resources based on user role
- Creating and managing user groups in the identity and access
- Enforcing company policies and procedures related to identity and
- Monitoring user activity in the identity and access management
- Identifying and addressing identity and access management issues.
- Working with the IAM team to resolve identity and access
- Reporting on identity and access management system activity.
- Maintaining up-to-date knowledge of identity and access
- Documenting IAM processes and procedures.
1. Be able to provide clear and concise reports to upper management on the
status of IAM within the organization.
2. Understand and be able to articulate the company’s IAM strategy.
3. Be able to develop IAM metrics and KPIs to track progress and measure
success.
4. Understand the various IAM tools and technologies available and be able
to recommend solutions that will meet the company’s needs.
5. Be able to lead IAM projects from start to finish, including developing
project plans, coordinating resources, and managing timelines
6. Be able to troubleshoot IAM issues and develop creative solutions to solve
problems.
7. Have a strong understanding of security concepts and how they apply to
IAM.
8. Be able to develop and deliver IAM training to both technical and nontechnical staff.
9. Be able to research and stay up-to-date on IAM trends and best practices.
10. Work effectively with other IT team members to ensure that IAM
solutions are integrated seamlessly into the overall IT infrastructure.
Types of Reports Prepared by an IAM Analyst
1. Access Request Report –
This report details all access requests made by users in the organization. You
should include information such as the date of the request, the user’s name and
department, the type of access requested, and whether or not the request was
approved.
2. User Provisioning Report –
This report details all user provisioning activities within the organization. You
should include information such as the date of the provisioning, the user’s name
and department, the type of access provisioned, and whether or not the
provisioning was successful.
3. Audit Report –
This report details all IAM-related audits that have been conducted within the
organization. You should include information such as the date of the audit, the type
of audit performed, the audit’s scope, and the audit’s findings.
4. IAM Strategy Report –
This report provides an overview of the company’s IAM strategy, including the
goals and objectives of the strategy, the tools and technologies that will be used,
the timeline for implementation, and the budget for the project.
5. User Authentication Report –
This report details all user authentication activities within the organization. You
should include information such as the date of the authentication, the user’s name
and department, the type of authentication used, and whether or not the
authentication was successful. Failed authentication attempts are also reported
and investigated to prevent a potential breach.
6. Password Reset Report –
This report details all password reset activities within the organization. You should
include information such as the date of the reset, the user’s name and department,
and whether or not the reset was successful.
7. Authorization Report –
This report details all authorization activities within the organization. You should
include information such as the date of the authorization, the user’s name and
department, the type of authorization requested, and whether or not the
authorization was approved.
-
Systems Analyst - Excel, Xml, Sql, Scripting
By CyberCoders At Salt Lake City, UT, United States 8 months ago
-
(Senior) Finance & Shared Services Manager
By Catholics For Choice At Washington, DC, United States 8 months ago
-
Paralegal - Probate Administration
By CyberCoders At Miami, FL, United States 8 months ago
-
Account Executive - Automotive Software
By ECW Search At United States 8 months ago
-
Construction Project Coordinator Jobs
By CyberCoders At River Falls, WI, United States 8 months ago