Overview
On Site
USD 79,880.00 - 136,340.00 per year
Full Time
Skills
Information Security
Identity Management
Collaboration
IT Management
Dashboard
LDAP
Data Analysis
Business Analysis
Requirements Elicitation
Process Mapping
Workflow
Writing
Test Cases
Test Scripts
Test Plans
Lifecycle Management
Authentication
Authorization
SailPoint
Microsoft Azure
SQL
Microsoft Power BI
Reporting
Documentation
Microsoft Excel
Microsoft Visio
Communication
Attention To Detail
Analytical Skill
Testing
Management
Network
Computer Science
Cyber Security
Security+
CISSP
CISM
Certified Ethical Hacker
ISSAP
GSEC
Budget
Job Details
Position Overview:
Highly Preferred Skills:
Job Description
Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur.
Job Responsibility
Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions.
Job Qualification
Bachelor's degree in Computer Science, Cyber Security or related field, required.
Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required.
2-4 years of related experience, required.
*Additional Salary Detail
The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity).
- Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards.
- Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets.
- Create and maintain detailed IAM system and workflow documentation based on business and technical requirements.
- Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services.
- Develop, execute, and document test cases to validate IAM workflow enhancements and system changes.
- Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories.
- Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives.
- Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents.
- Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations.
- Participate in on-call rotation as needed to support critical IAM functions and operational continuity.
Highly Preferred Skills:
- 2-5 years of experience as an IAM Analyst, Business Analyst, or similar technical/functional role.
- Strong business analysis skills, including requirements gathering, process mapping, and workflow design.
- Experience writing and executing test cases, test scripts, and test plans.
- Familiarity with IAM systems and concepts such as identity lifecycle management, authentication, authorization, roles, and entitlements.
- Experience with IAM tools (e.g., Okta, SailPoint, Azure AD/Entra ID, Duo) is preferred but not required.
- Working knowledge of SQL, Power BI, or other reporting tools is a plus.
- Strong documentation skills using MS Word, Excel, Visio, or similar tools.
- Excellent verbal and written communication skills; able to translate between business and technical language.
- Detail-oriented, analytical thinker, and effective problem solver.
- Willingness to participate in testing activities and occasional on-call or after-hours support if needed.
Job Description
Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur.
Job Responsibility
Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions.
Job Qualification
Bachelor's degree in Computer Science, Cyber Security or related field, required.
Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required.
2-4 years of related experience, required.
*Additional Salary Detail
The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity).
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.