Identity Access Management Technical Analyst

Company Name:
American Transmission Co.
The IAM System Analyst plans and coordinates Identity Access Management (IAM) application activities for ATC and its stakeholders. This role is responsible for designing IAM solutions that meet IAM Program vision and strategy of the organization. The Analyst plans, prioritizes and manages projects, service requests and routine assignments associated with IAM system activity. This role maintains IAM architectural direction with key technology stakeholders across ATC and guides technology projects to make use of IAM technical solutions. The IAM System Analyst works closely with the IAM Program Manager and Human Resource System owners to ensure proper integration takes place between the Human Resource Information Management and the Identity Access Management core systems.
The objective is for ATC to have full visibility to the access that has been authorized to ATC systems, information and facilities, for all employee and non-employee resources. This will facilitate ATC's effective management of authorized access for onboarding and exiting employee and non-employee resources.
Drives IAM related project requirements and specifications for existing and new system integration initiatives
Identify IAM best practices, encourage standards and reduce risk
Collaborate with third party vendors to integrate off-the-shelf and custom software solutions
Collaborate with various application administrators to document system details and plan future state
Manage Integrations with cloud based identity and on premise service providers
Develop streamlined approaches for converting current methods to automated processes
Design and develop centralized authorization systems that control the behavior of multiple applications
Collaborate on the conversion of legacy software to centralized authentication and authorization
Build and deploy centralized automated user provisioning for a wide variety of connected systems
Design, deploy and maintain integration with Active Directory, SQL, Oracle and Human Resource Information Management systems, data feeds from non-connected systems and source systems and automated access management workflows for connected and non-connected systems
Build and deploy certification campaigns and bulk provisioning activities based on business requirements
Work with ISS Engineers and Application teams to troubleshoot and resolve IAM issues
Coordinate deployment of IAM application version updates and patches with ISS engineers
Build custom IAM reports as required by ATC business constituents
Build and maintain IAM program standards, templates, and deliverables
Maintain on-call status and assist all IT personnel to resolve security problems with production activities. Participate directly in 24 X 365 on-call rotation, off-hour support activities.
May be called upon to serve before, during, and after a Transmission Emergency Response Plan (TERP) event; such event may require performing functions that are outside the scope of your regular job
Demonstrate compliance with ATC's Code of Conduct, all company policies and procedures, and all laws and regulations that govern ATC
Performs other duties as assigned
Minimum preferred: Bachelor's degree in Computer Science, Management Information Systems, Engineering, or related discipline
Consideration may be given to individuals with a demonstrated progression in relevant work experience with certification credentials
At least five to seven years of Information Technology experience combined with at least four (4) years of Microsoft Active Directory Experience
At least two (2) years relevant experience with Identity Access Management
Information system certifications such as CISSP or CISA
Experience developing IAM strategies, architectures, and implementation plans
Experience managing projects through the full system development lifecycle
Familiarity with development environments/languages, such as: J2EE, Java, JavaScript, .NET or C#
Familiarity with Identity Management topics: Single Sign On; Enterprise Directory and Design including directory schema, namespace and replication topology; Role Base Access Control, Federated Identity
Experience facilitating business process design as it relates to managing identities and access privileges
Experience leading business requirements gathering and translating those into system requirements
Familiarity with web services security and IAM management tools
Experience with managing security and technology controls; such as SANS, NIST, ISO, COBIT
Demonstrated ability to write report segments and to participate in presentations
Physical Requirements:
Executive, administrative or clerical position in which employee is primarily involved with sedentary work, including keyboarding
Requires occasional lifting objects 10 to 15 pounds and/or light physical activity including bending, squatting, stooping, twisting, reaching, walking, standing and working on irregular surfaces
Date: 2014-03-21
Country: US
State: WI
City: Pewaukee
Category: Information Technology and Shared Services

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.