[Close] 

Information Security Analyst - IAM

Company Name:
Softworld Inc
Job Number: 216296
Information Security Analyst - IAM
Security Analyst- IAM
Boston, MA
Requirements
Bachelors or Graduate-level degree in a related field of study
Experience as an IT analyst or performing analytical functions
Security management, operations or administration experience.
Experience working with Identity and Access Management tools and project coordination and/or project management experience.
Expert knowledge of three or more of the following technologies: Directory Services, Authentication/Authorization, Access Provisioning, Access Review, Public Key Infrastructure, Single Sign On, and Federation.
Expertise with Microsoft tools, e.g. Word, Excel, and Access
Experience with Windows and Unix Security Administration Menus
Proven problem solving and analytical skills
Excellent oral and written communication skills
Working knowledge of MS Active Directory, Exchange, DNS, DHCP, TCP/IP
Experience designing and integrating IAM solutions
Responsibilities
The IAM analyst role partners with the business owners and application managers to utilize identity access management solutions for user identities, authentication and authorization to resources.
The person in this position ensures that business needs are analyzed and translated into effective security administration processes; transparently integrating access management across the Company.
This person streamlines and helps automate access processes to ensure efficiency and effectiveness of access provisioning.
This position will also support Companies' workforce by ensuring timely and accurate administration and management of access privileges
Provides efficient administration of user access to those systems maintained by the Information Security administration group.
Coordinates across Business Partners and Information Technology Application Groups to identify access requirements and assists in integrating these requirements into Security Administration tools and processes.
Analyzes Security Administration processes / workflows, recommends ways to improve efficiency and effectiveness and helps implement the solutions.
Establishes and analyzes identities, roles and access assignment.Supports identity access management tools; ensuring incident investigation and ensuring resolution.
Reviews, develops, and maintains security administration's processes and procedures.
Evaluates Identity Access Management (IAM) solutions and assists in implementation of such solutions.
Configures, analyses, and maintains IAM tool ensuring high efficiency and effectiveness of the tool.
Coordinates timely incident and problem resolution with vendors.
Recommends, analyzes and supports integration of additional systems/applications to IAM.
Recommends, analyzes and supports integration of additional systems/applications to Active Directory - LDAP.
Obtains and reports on key metrics for security administration operational effectiveness.
Assists with automation of tasks to reduce manual and repetitive work. May include writing or configuring simple scripts.
THIRD PARTY AGENCIES, SUBCONTRACTORS, AND RECRUITERS NEED NOT APPLY. Applicants received from firms will not be considered. Subcontracting is not available for this position.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.