The Cyber Security IAM Specialist role will performs all
necessary duties to ensure the safety of information technology assets and to
protect systems from intentional or inadvertent access. Assists with the
design, development, or recommends integrated IAM solutions that will ensure
all proprietary/confidential data and systems are protected. Assist on application onboarding, approval workflows and failed
approval/provisioning tasks. Role include Authoritative Source, Identity
Management, Provisioning, Authentication, Authorization, Monitoring &
Certifications, and Auditing & Reporting.
Essential
Duties:
- Responsible for developing and supporting improvements to all
identity related solutions.
- Handle complex security tasks and provides guidance to less experienced
staff and must be able to conduct business matters for sensitive information in
a confidential and professional manner.
- Analyze system logs and other event logs to detect nefarious
access activity
- Track reports, including user related access incidents and guides
the investigation and resolution of such incidents
- Recommends, tests, schedules and implements upgrades and patches
that may affect UH as well as the enterprise security applications and the
servers they reside on.
- Monitor security events daily, performing investigations and
working with appropriate team members, business teams and Technology teams to
develop solutions that address critical security concerns
- Assist in technical support of security related
to third party software, operating systems or databases.
- Design, maintain IAM tools and documentation of processes and
audit-related policies
- Actively pursue IAM process improvements
- Troubleshoot related security-related issues
- Provide technical phone support for security related issues for
supervisors, managers and above
- Record, track, diagnose and resolve problems tickets consisting
primarily of user account issues, file and folders permissions, password resets
and application access problems
- Oversee and execute the new hire orientation reports
- Server account creation, termination and rights management
- Hours commensurate with standard system administration
responsibilities including 24 x 7 production support on a rotating basis.
Performs occasional night/weekend work as assigned/needed.
- Research and resolve first tier problems via Service Desk Trouble
Tickets.
- Develop unique skills & abilities valued by
his/her peers.
- Ability to coordinate, analyze, observe, make
decisions, and meet deadlines in a detail-oriented manner. Partner with other
teams as needed.
The Cyber Security IAM Specialist role will performs all
necessary duties to ensure the safety of information technology assets and to
protect systems from intentional or inadvertent access. Assists with the
design, development, or recommends integrated IAM solutions that will ensure
all proprietary/confidential data and systems are protected. Assist on application onboarding, approval workflows and failed
approval/provisioning tasks. Role include Authoritative Source, Identity
Management, Provisioning, Authentication, Authorization, Monitoring &
Certifications, and Auditing & Reporting.
Essential
Duties:
- Responsible for developing and supporting improvements to all
identity related solutions.
- Handle complex security tasks and provides guidance to less experienced
staff and must be able to conduct business matters for sensitive information in
a confidential and professional manner.
- Analyze system logs and other event logs to detect nefarious
access activity
- Track reports, including user related access incidents and guides
the investigation and resolution of such incidents
- Recommends, tests, schedules and implements upgrades and patches
that may affect UH as well as the enterprise security applications and the
servers they reside on.
- Monitor security events daily, performing investigations and
working with appropriate team members, business teams and Technology teams to
develop solutions that address critical security concerns
- Assist in technical support of security related
to third party software, operating systems or databases.
- Design, maintain IAM tools and documentation of processes and
audit-related policies
- Actively pursue IAM process improvements
- Troubleshoot related security-related issues
- Provide technical phone support for security related issues for
supervisors, managers and above
- Record, track, diagnose and resolve problems tickets consisting
primarily of user account issues, file and folders permissions, password resets
and application access problems
- Oversee and execute the new hire orientation reports
- Server account creation, termination and rights management
- Hours commensurate with standard system administration
responsibilities including 24 x 7 production support on a rotating basis.
Performs occasional night/weekend work as assigned/needed.
- Research and resolve first tier problems via Service Desk Trouble
Tickets.
- Develop unique skills & abilities valued by
his/her peers.
- Ability to coordinate, analyze, observe, make
decisions, and meet deadlines in a detail-oriented manner. Partner with other
teams as needed.
Experience
& Knowledge:
- Five years IT experience and two year of information security, identity management, access control is
required.
- Experience with
the following technologies/products: SailPoint, MIM, Oracle, Beyond Trust,
CyberArc, Varonis or other
Privileged/Identity Access Management solutions
- Experience with
programming languages such as; XML, shell or JavaScript is preferred.
- Functional understanding of
database concepts
- Windows GPO management experience,
including troubleshooting GPO conflicts
- Experience
in a Healthcare provider environment required.
- Must be detail-oriented and organized, with good
analytical and problem solving ability.
- Ability to function
independently and as a team player in a fast-paced environment required.
- Must have
strong written and verbal communication skills.
- Ability
to effectively document processes required.
- Familiarity
with ITIL framework required.
Special
Skills & Knowledge:
- Hands-on Windows 2012 Server (or
more recent) administration experience
- Hands-on Active Directory and LDAP
experience
- Functional understanding of TCP/IP
networks and network boundary controls
- Notable client service,
communication and relationship building skills required
- Proficiency
with Microsoft Office Suite required.
- Intermediate skill level with
creating, modifying, and executing system scripts
Education/Expertise:
- High School Diploma or equivalent required.
Bachelor’s Degree Preferred.
Required
Credentials, Licensure or Certification (i.e. RN, RRT):
- Microsoft Certified Solution Expert
is desirable
- Product related certification