job summary: The Remote Identity Access Management (IAM) Security Analyst will actively participate in the implementation of the enterprise wide IAM Program. The role requires technical exposure to IAM tool suites such as SailPoint, Oracle Identity Manager (OIM), and Okta. It requires continuous participation in the implementation of new IAM tool connectors, UAT testing of all IAM integrations, process documentation, and continuous support and participation in initiatives that enhance the IAM program. The IAM Program is committed to enhancing processes and procedures that support automated access administration, single sign-on (SSO), directory services and technical integrations, as well as supporting behavioral analytics. The ideal candidate is technical and has experience in technology and security administration across large organizational networks, including third-party entities. This role includes active contributions to the IAM Program, including identification of internal and external IAM risks and opportunities for improvement. You will engage business and technology teams to ensure a solid understanding of IAM practices and certification requirements to safely maintain and track access within the HealthEquity environment, You will be expected to be a proactive corporate citizen and generate security solutions that enhance business and reduce risk. location: Phoenix, Arizona job type: Contract salary: $44.00 - 49.71 per hour work hours: 8am to 5pm education: High School responsibilities: What you'll be doing (Job Duties & Responsibilities) - Act as an IAM SME by identifying internal and external identity and access management risks and opportunities for improvement - Manage user access certifications (UACs) for in-scope applications and systems to ensure compliance with SOX (Sarbanes-Oxley) regulations - Collaborate closely with compliance and audit teams to ensure that access management practices align with SOX requirements. - Define roles and entitlements within our applications and platforms - Create and maintain metrics associated with UACs and application/platform integrations - Participate in security projects for the Identity Access Management Team - Develops, solicit, and maintain all necessary and appropriate documentation for assigned projects - Act as the liaison among partners to review, document, and communicate system activities to ensure access assignments or requests are completed consistent with service level and IAM standards - Drive processes to understand access requirements and develops role models and standards for IAM processes - Partner with Application Administrators to address business and technical issues involved in deploying, governing, and extending identity services - Capture user identity administration exceptions and determines and documents course of action for resolution - Analyze root cause to recommend resolutions for provisioning and de-provisioning activities in accordance with standards, policies, and procedures - Identify, implement, and improve current processes to support the Identity Access Governance program including controls, data quality, security risk reduction, and regulatory compliance - Identify and define mitigation plans for risks and issues related to project timeline, resources, or quality. - Coordinate and conduct impact assessment across all relevant Operations teams - Partner with IT development group and core business unit to develop and implement new systems and improvements of existing systems - Facilitate collaboration and leads multi-functional teams to drive projects to completion - Participate in User Acceptance Testing (UAT) phases for defect fixes, improvements, and other pivotal initiatives - Provide IAM process guidance and requirements, creates IAM solutions, collaborates with business partners and engineers, and creates roles for application onboarding qualifications: What you will need to be successful (Skills, Knowledge, & Experience) - Bachelors degree, or the equivalent years related experience required - Experience crafting process documentation - Preferred experience in end user interaction in developing, documenting, and implementing business roles and procedures - Exposure to policy and regulatory environment of information security - CISSP or similar security certification preferred - Participate in multiple highly visible projects and initiatives skills: - Ability to work in a fast-paced environment with changing priorities - Use indirect leadership to influence peers and leadership - Demonstrate time management and priority setting skills - Identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions - Understanding of IAM principles - Exposure to IAM tools such as SailPoint Identity Access Management, Oracle Identity Manager, Okta, etc. - Good communication skills Equal Opportunity Employer: Race, Color, Religion, Sex, Sexual Orientation, Gender Identity, National Origin, Age, Genetic Information, Disability, Protected Veteran Status, or any other legally protected group status.At Randstad Digital, we welcome people of all abilities and want to ensure that our hiring and interview process meets the needs of all applicants. If you require a reasonable accommodation to make your application or interview experience a great one, please contact HRsupport@randstadusa.com. Pay offered to a successful candidate will be based on several factors including the candidate's education, work experience, work location, specific job duties, certifications, etc. In addition, Randstad Digital offers a comprehensive benefits package, including: medical, prescription, dental, vision, AD&D, and life insurance offerings, short-term disability, and a 401K plan (all benefits are based on eligibility). This posting is open for thirty (30) days. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.