Senior Identity & Access Management (IAM) Analyst

  • Los Angeles, CA
  • Posted 38 days ago | Updated 11 hours ago

Overview

On Site
USD 95,900.00 - 222,100.00 per year
Full Time

Skills

Information security
Incident management
Risk assessment
Physical security
Design
Documentation
Mentorship
IMPACT
Operations
Modeling
Budget
Access control
RBAC
Governance
Identity management
IT security
Auditing
Leadership
Project management
Scheduling
Status reports
Higher education
Research
Training
Information systems
Account management
Provisioning
Computer hardware
Data
Directory Services
Active Directory
LDAP
Authentication
SSO
Multi-factor authentication
Communication
Organizational skills
Problem solving
ROOT
Strategy
Cyber security
Information Technology
Computer science
Business administration
Policies

Job Details

Department Summary

The UCLA Information Security Office enables UCLA's goals by providing leadership assuring the confidentiality, integrity, and availability of its information resources. The Information Security Office enables efficient incident response planning and notification procedures. In addition, the office aims to implement risk assessment strategies to identify vulnerabilities and threats to departmental information resources and enterprise systems. This includes executing a comprehensive UCLA IT security plan, which involves proposing, delivering, and enforcing administrative, technical, and physical security measures to tackle identified risks based on their sensitivity or criticality. Identity and Access Management protects UCLA's resources and supports university business through access management, including account lifecycle, authentication, access, and role-based provisioning at the enterprise level. This team implements rigorous regulation of entitlements through granular access control and the auditing of all identities managed by UCLA.
Position Summary

The Senior Identity & Access Management (IAM) Analyst will be responsible for leading the design, implementation, and support of advanced identity and access management data, processes, and technologies. This role will work closely with various departments across the university, as well as external vendors, to ensure quality of identity data, the establishment of data standards, and the appropriate access levels are granted to users in a timely, secure, and compliant manner, focusing on automation wherever possible. In addition, the position will evaluate and test new software and upgrades. The Senior IAM Analyst will produce documentation, procedures, and any necessary materials to support IAM services. The Senior IAM Analyst will also mentor and guide junior analysts in the team. The Senior IAM Analyst will positively impact UCLA's operations and culture by protecting University stakeholder's information and data in service of the institution's academic and research mission. This team member will advance the University's mission by delivering exceptional IAM service comprehensively and consistently across faculty, staff, students, and persons of interest. This role will execute UCLA's vision while modeling UCLA's culture and values.

Salary & Compensation

*UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit to discover benefits that start on day one, and to calculate the total compensation value with benefits.
Qualifications

  • Five years Experience working in one or more of the following fields: IAM, cybersecurity, computer science, computer information systems, or related field. (Required)
  • Advanced experience using identity and access tools and systems in a distributed IT environment (Required)
  • Expert knowledge & experience of IAM principles, technologies, & best practices, including experience with role-based access control (RBAC), access governance (IGA), & privileged access management. (Required)
  • Advanced experience in supporting IT security requirements with identity and access logs and audit records. (Required)
  • Experience working in a project-based environment using leading project management practices including schedule management, status reporting, and communication of project risks and issues. (Required)
  • Experience participating in activities to advance an inclusive environment that values equity, diversity, inclusion and belonging. (Required)
  • Seven or more years Experience working in one or more of the following fields: IAM, cybersecurity, computer science, computer information systems, etc. (Preferred)
  • Experience in complex higher education environments, serving academic research and administrative functions of a large public university. (Preferred)
  • IAM, cybersecurity, computer science, computer information systems, or related field, or equivalent combination of experience/training. (Required)
  • IAM, cybersecurity, computer science, computer information systems, etc.
  • Demonstrated skills applying secure user authentication and account management standards to vendor provisioning solutions, computer software, and hardware at scale. (Required)
  • Demonstrated skill at administering complex access data based on validated data source systems. (Required)
  • Familiarity with directory services (e.g., Active Directory, LDAP), and authentication (e.g., Single Sign-On (SSO)) technologies, and multi-factor authentication (MFA) solutions. (Required)
  • Strong written and verbal communication skills and is able to communicate complex technical ideas to a diverse community of colleagues and stakeholders. Can relay technical information to audiences of technical and non-technical stakeholders. (Required)
  • Able to establish and advance positive working relationships and a strong rapport with a diverse community of colleagues including team members, stakeholders, and customers. (Required)
  • Advanced organizational skills and is able to balance competing priorities and deliver concurrent projects to various stakeholder types. (Required)
  • Advanced problem-solving skills; ability to uncover root of difficult problems and scope solutions based on knowledge of available resources and timelines as well as awareness of vision and strategy. (Required)
  • Seeks information from multiple and diverse sources to inform solutions. Demonstrated ability to make decisions with integrity. (Required)
  • Thinks creatively and introduces innovations such as the incorporation of new technologies or processes. Thrives in an ever-changing, fast-paced environment. (Required)

  • Education, Licenses, Certifications & Personal Affiliations

  • Bachelor's Degree Cybersecurity, information technology, computer science, public administration, business administration, communications, or related field. (Required)
  • Bachelor's Degree Cybersecurity, information technology, computer science, public administration, business administration, communications. (Preferred)

  • Special Conditions for Employment

  • Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation.
  • Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment.

  • Schedule

    8:00 A.M. to 5:00 P.M. PT, Monday through Friday and/or variable based upon operational needs.
    Union/Policy Covered

    99-Policy Covered
    Complete Position Description
    Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.