UNIX, IAM Security Analyst
Info Security Analyst
The Access Management Information Security Analyst for the UNIX/FoxT implementation primary function is to process UNIX/FoxT requests from a queue based system.
This includes provisioning access, removing inappropriate access, educating end users regarding security protocols and properly utilizing request forms, analyzing trends to drive continuous improvement, scrutinizing access requested and recommending other access in accordance with least amount of access necessary.
Coordinating and assisting the UNIX and FoxT SME with project work to operationalize the UNIX environment including current remediation efforts.
Helping to develop metrics, documenting SOPs, assisting with implementing new standards under the guidance of the SMEs will also be included as secondary duties. Candidates must be comfortable interfacing with senior executives, providing exceptional customer experience, and delivering value to the business.
- Provide operational support for IAM tools FoxT, SailPoint, Cyberark
- Provision/Deprovision access primarily for UNIX from tasks out of a queue based system
- Process a high volume of requests meeting metrics and exceeding SLAs.
- Providing full account lifecycle management and privilege access provisioning in Unix/Linux operating systems.
- Work with designated SMEs to identify UNIX entitlements, build out roles, and remove inappropriate access.
- Coordinate implementation of remediation steps for identified security access misconfigurations
- Assist in reporting metrics to measure the service and identify potential risks
- Assist with updating operating documents, i.e, SOPs, governance policies, etc..
- Utilize Powershell, Linux, and Perl shell script.
- Assist queue manager with analysis of metrics related to service
- Communicating changes to the rest of the IAM team
- Assist queue manager with Service Now Catalog Enhancement and Process Workflows for UNIX/FoxT
- 2+ years of relevant work experience (UNIX, IAM)
- Experience using VI editor
- College training or experience in an identity and access management role
- Understand network security and network/distributed computing concepts.
- Must be able to work independently or on a team performing semi-routine tasks.
- Ability to process a high volume of tasks with a high degree of accuracy.
- Ability to work under tight time constraints with changing requirements.
- Exceptional interpersonal skills, with a focus on rapport-building, listening, and questioning skills
- Ability to quickly absorb information and adapt to an ever changing environment
- Strong documentation and problem solving skills
- Strong desire to learn and be a contributing member of a team
- Highly self-motivated, directed, and can work independently without supervision in a high-pressure environment
Desired Skills (Preferred not required):
- Four year degree preferred
- Experience with security protocols (LDAP, SAML, SPML, XACML, OAUTH, OpenID etc.)