17 Sep
IT Security Identity Management Specialist
Utah, Salt lake city , 84101 Salt lake city USA

Vacancy expired!

Healthcare's helping hand. CHG shook things up in 1979 by inventing the locum tenens staffing model. We connect doctors with patients who need their care. As the largest physician staffing firm in America, our providers treat millions of patients each year.Our industry is growing and demand is high. This means you'll have plenty of opportunities to grow and develop in your career. Keeping healthcare healthy can be as fun as it is rewarding.The IT Security Analyst will be responsible for access governance related activities involving access certification, provisioning, and application/system on-boarding. This individual will work with various project teams, other software engineers and operations teams to ensure that Information Security Guidelines and standards are adhered to while meeting the requirements for the business. In this role, you will be expected to continuously improve identity and access management request functionality, while driving future direction and evolution of IdM technologies and processes. The IT Security Analyst will support and continually improve the time, cost, and risk association with Information Security programs which include governance (policy & standards), issue resolution, security enhancements, new security technology evaluation and testing, project requirement gathering, internal client communications, documentation, and security awareness.The position requires excellent leadership, influence, communication, presentation, and interpersonal skills.Your role:

  • Provisioning activities and executing day-to-day tasks to include creating, deleting, disabling, enabling, unlocking and modifying user accounts
  • Participate in the analysis and execution of aligning applications and systems to IDM Governance framework with an understanding of Authentication, Authorization, Administration, and Auditing services
  • Develop connections to systems using scripting languages
  • Ensuring that provisioning actions are operating in an efficient manner and performed in accordance with provisioning policies
  • Participate in the installation, integration, deployment, and support IAM tools and products
  • Work with product teams in implementing the correct solutions for their needs while adhering to our security standards and best practices
  • Create and maintain documentation for security related activities and metric reporting
  • Advocate secure computing practices and procedures, and communicate Information Security best practices throughout the company
  • Ability to effectively develop remediation and corrective action plans with business teams, software engineers, and operations teams
  • Provides practical and meaningful recommendations regarding continuous improvement on Information Security and Privacy programs and practices
  • Analyze and assess security incidents and escalate where appropriate
Your qualifications:
  • Understanding of business processes associated with user management lifecycle and ability to design and implement work-flow and rule-based provisioning solutions that meet complex business requirements preferred
  • Experience with Identity Management processes and tools
  • Creates within the team a shared focus on the importance of achieving results. Establishes and defines roles and responsibilities, specific outcomes, and clear measures for quality and success of the team
  • Excellent interpersonal skills, including the ability to effectively interact with all levels of the organization in a professional manner
  • Technical experience in implementing, maintaining, and improving IAM solutions
  • Smart, creative, energetic, conscientious, and enthusiastic person with strong problem solving skills
  • Strong familiarity with risk management and information security practices
  • MUST be experienced (at least 3 years) with implementing and optimizing solutions using many of the following technologies and concepts
  • Active Directory (Familiar with domain design, directory structure, GPO, security best practices, etc.) and LDAP
  • Single Sign-on protocols (SAML 2.0, OAUTH, OpenID, etc.)
  • Microsoft Azure Active Directory
  • Database knowledge with SQL experience
  • PowerShell scripting language
  • Privileged Access Management
  • Two-factor and Adaptive Authentication
  • Identity Management (requesting, automated provisioning, de-provisioning, reconciliation, certification, etc.)
Education & Years of Experience:
  • 3-4+ years experience of information security experience with a focus on Identity and Access Management
  • College degree in related field
  • MUST be experienced (at least 3 years) with implementing and optimizing solutions using many of the following technologies and concepts:
    • Active Directory (Familiar with domain design, directory structure, GPO, security best practices, etc.) and LDAP
    • Single Sign-on protocols (SAML 2.0, OAUTH, OpenID, etc.)
    • Miscrsoft Azure Active Directory
    • Database knowledge with SQL experience
    • Powershell scripting language
    • Privileged Access Management
    • Two-factor and Adaptive Authentication
    • Identity Management (requesting, automated provisioning, de-provisioning, reconciliation, certification, etc.)
Preferred:
  • Have one or more of the following professional certifications: CISSP, CISM, CRISC, OSCP, GPEN, Identity Management Institute (CIST, CIAM, CIMP, CAMS)
  • Experience with Public and Private Cloud IAM (Familiarity with IDaaS solutions such as Azure AD, as well as securing SaaS) is a plus
  • Progressive and focused work experience in continuous improvement initiatives utilizing LEAN techniques
In return, we offer:
  • Competitive pay
  • Flexible work schedules - including work from home options available
  • 401 (k) retirement plan
  • Healthcare coverage with corporate wellness program
  • Free health center and health coaching for employees and dependents
  • 14 days of PTO your first year and paid holidays
  • Up to 16 hours of paid volunteer time off
  • Award-winning training and development programs
Click here to learn more about our company and culture.To have your resume reviewed by Talent Acquisition, click "Apply" at the top of the screen. We are an Affirmative Action/Equal Opportunity EmployerVeterans/DisabledWe are an at-will employer

Vacancy expired!


Related jobs

Report job