Overview
Remote
On Site
Full Time
Skills
Management
Information Security
Privacy
Security Analysis
Multi-factor Authentication
Windows PowerShell
Python
Customization
OIDC
OAuth
SAML
API
SailPoint
CyberArk
Identity Management
Dependability
Software Development Methodology
IaaS
Network Design
Operating Systems
Security Controls
Risk Management
Regulatory Compliance
Sarbanes-Oxley
Communication
Attention To Detail
Analytical Skill
Problem Solving
Conflict Resolution
Interfaces
Microsoft Technologies
Customer Service
FOCUS
Collaboration
Scripting
Finance
Business Process
Cloud Computing
Microsoft
CISSP
Information Systems
Job Details
Title: Cyber Posture Management Analyst
Type: Direct Hire
Location: Lansing, Michigan
Clover Consulting (a Myticas Co.) has a large, direct client seeking a skilled Cyber Posture Mgmt. Analyst I to join the team as part of their Information Security & Privacy team. This position provides security analysis for the company's Identity and Access Management (IAM) Operation's program. This role requires knowledge across multiple platforms, applications, processes, and procedures to enable access management of business initiatives across the enterprise.
Essential Responsibilities
Knowledge, Skills and Abilities
Qualifications
Type: Direct Hire
Location: Lansing, Michigan
Clover Consulting (a Myticas Co.) has a large, direct client seeking a skilled Cyber Posture Mgmt. Analyst I to join the team as part of their Information Security & Privacy team. This position provides security analysis for the company's Identity and Access Management (IAM) Operation's program. This role requires knowledge across multiple platforms, applications, processes, and procedures to enable access management of business initiatives across the enterprise.
Essential Responsibilities
- Familiar with identity and access management, with a focus on Privileged Access Management (PAM), Multi-Factor Authentication (MFA), and Identity Governance and Administration (IGA).
- Knowledge of scripting languages (e.g., PowerShell, Python) for automation and customization of IAM solutions.
- Understanding of identity protocols and technologies: OpenID Connect (OIDC,) OAuth, SAML, AD-Fed, API Gateways, SCIM, and platforms such as, Sailpoint, CyberArk, and MS Entra.
- Knowledge of identity & access management vulnerabilities, threats and mitigations.
- Ability to determine how a security system works (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Familiar with modern software life cycle development and automated cloud infrastructure deployment.
- Understanding of network architecture, operating systems, and security protocols.
- Ability to work independently and collaboratively in a fast-paced environment.
- Supports initiatives and projects that will improve the organization's cyber posture.
- Excellent analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Understanding of security controls, risk management, and regulatory compliance (NIST CSF/SOX/GDPR/etc.).
- Extended hours, including on-call may be required.
Knowledge, Skills and Abilities
- Ability to receive and incorporate feedback.
- Strong verbal and written communication skills.
- Strong attention to detail.
- Strong interpersonal, analytical, and problem-solving skills.
- Flexibility in day-to-day work.
- Ability to learn the company's supported systems and their interfaces with other systems.
- Strong knowledge of Microsoft software applications.
- Ability to communicate technical concepts in an understandable fashion.
- Ability to prioritize multiple tasks and execute efficiently and effectively while demonstrating a clear sense of urgency when appropriate.
- Excellent customer service focus and skills.
- Ability to collaborate effectively in a team environment to achieve desired results.
- Scripting knowledge preferred.
Qualifications
- Bachelor's Degree or equivalent experience and/or education required.
- 1+ years knowledge of financial products, regulatory requirements, and business process preferred.
- Cloud Identity experience preferred.
- SC-300 Microsoft Certified Identity and Access Administrator Associate preferred.
- CISSP Certified Information Systems Security Professional preferred.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.