CodeForce
IAM Analyst
CodeForce, Dallas, Texas, United States, 75215
The Identity & Access Management (IAM) Analyst must possess a strong understanding of IAM concepts/ trends, as well as knowledge of relevant IAM business and technical expertise. A successful candidate must be a proven self-starter with the ability to problem-solve, communicate across the organization, participate in diverse projects focusing on technical and business-related aspects, as well as interface effectively with multiple teams.
Position Responsibilities
Participate in IAM audits and review access control reports to identify potential risks and conduct regular access certification reviews to ensure that user access rights are appropriate and comply with security policies and regulatory requirements. Work with business units to remediate access discrepancies and ensure timely certification completion. Perform operational activities for the Identity and Access Management program, including but not limited to the processing of requests to provision and de-provision access, facilitation of the user lifecycle (Joiner, Mover, Leaver), and the monitoring of Identity Governance, Identity Management, and Privileged Access Management systems. (SailPoint, Saviynt, Secret Server, Entra, AWS, CyberArk, etc) Review and analyze provisioning and deprovisioning of user accounts based on approved access requests and role-based access controls (RBAC). Maintain and update user access documentation, knowledge articles and records. Identify opportunities to enhance IAM processes and workflows. Participate in cross-team communication and the creation and maintenance of technical and departmental process documentation. Facilitate the resolution of ServiceNow requests and incidents. Provide insight into potential modifications to role-based access as necessary. Participate in design discussion regarding new functionality and enhancements that will be maintained and monitored by IAM Operations. The duties listed above are the essential functions, or fundamental duties within the job classification. The essential functions of individual positions within the classification may differ. Texas Capital may assign reasonably related additional duties to individual employees consistent with standard departmental policy.
Requirements
Minimum 3 years of experience in information security, risk assessment, or a relevant domain Strong understanding of IAM principles methodologies and technologies Ability to work independently and collaboratively in a fast-paced environment Bachelor's degree from an accredited college or university preferred. Experience performing access provisioning and de-provisioning according to documented procedures required. Experience facilitating user lifecycle events (Joiner, Mover, Leaver) required. Experience maintaining and monitoring identity and access governance functions in SailPoint, Okta, Secret Server, AWS and Azure preferred. Experience operating an ITIL based ITSM such as ServiceNow preferred. Experience with enterprise directory service (LDAP) administration, such as Active Directory preferred. Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as COBIT, COSO, FFIEC and NIST. Record of building and maintaining relationships with a consultative and engaging style . Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority from executive management to internal and external audit and risk teams. Must be able to prioritize work on a daily basis and throughout the day as needed. Troubleshooting and organizational skills and ability to work on multiple initiatives simultaneously is a must. Deliverables:
Process Flows Mentor and Knowledge transfer to client project team members Participate as primary, co and/or contributing author on any and all project deliverables associated with their assigned areas of responsibility Participate in data conversion and data maintenance Provide best practice and industry specific solutions Advise on and provide alternative (out of the box) solutions Provide thought leadership as well as hands on technical configuration/development as needed. Participate as a team member of the functional team Perform other duties as assigned.
Position Responsibilities
Participate in IAM audits and review access control reports to identify potential risks and conduct regular access certification reviews to ensure that user access rights are appropriate and comply with security policies and regulatory requirements. Work with business units to remediate access discrepancies and ensure timely certification completion. Perform operational activities for the Identity and Access Management program, including but not limited to the processing of requests to provision and de-provision access, facilitation of the user lifecycle (Joiner, Mover, Leaver), and the monitoring of Identity Governance, Identity Management, and Privileged Access Management systems. (SailPoint, Saviynt, Secret Server, Entra, AWS, CyberArk, etc) Review and analyze provisioning and deprovisioning of user accounts based on approved access requests and role-based access controls (RBAC). Maintain and update user access documentation, knowledge articles and records. Identify opportunities to enhance IAM processes and workflows. Participate in cross-team communication and the creation and maintenance of technical and departmental process documentation. Facilitate the resolution of ServiceNow requests and incidents. Provide insight into potential modifications to role-based access as necessary. Participate in design discussion regarding new functionality and enhancements that will be maintained and monitored by IAM Operations. The duties listed above are the essential functions, or fundamental duties within the job classification. The essential functions of individual positions within the classification may differ. Texas Capital may assign reasonably related additional duties to individual employees consistent with standard departmental policy.
Requirements
Minimum 3 years of experience in information security, risk assessment, or a relevant domain Strong understanding of IAM principles methodologies and technologies Ability to work independently and collaboratively in a fast-paced environment Bachelor's degree from an accredited college or university preferred. Experience performing access provisioning and de-provisioning according to documented procedures required. Experience facilitating user lifecycle events (Joiner, Mover, Leaver) required. Experience maintaining and monitoring identity and access governance functions in SailPoint, Okta, Secret Server, AWS and Azure preferred. Experience operating an ITIL based ITSM such as ServiceNow preferred. Experience with enterprise directory service (LDAP) administration, such as Active Directory preferred. Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as COBIT, COSO, FFIEC and NIST. Record of building and maintaining relationships with a consultative and engaging style . Strong verbal/written communication, with ability to effectively interact with individuals at all levels of responsibility and authority from executive management to internal and external audit and risk teams. Must be able to prioritize work on a daily basis and throughout the day as needed. Troubleshooting and organizational skills and ability to work on multiple initiatives simultaneously is a must. Deliverables:
Process Flows Mentor and Knowledge transfer to client project team members Participate as primary, co and/or contributing author on any and all project deliverables associated with their assigned areas of responsibility Participate in data conversion and data maintenance Provide best practice and industry specific solutions Advise on and provide alternative (out of the box) solutions Provide thought leadership as well as hands on technical configuration/development as needed. Participate as a team member of the functional team Perform other duties as assigned.