logo

JobNob

Your Career. Our Passion.

Identity and Access Management Administrator II


Software Technology Inc


Location

Colorado | United States


Job description

The Identity & Access Management team is responsible for how users within an organization are given an identity, and how it is protected, which includes securing critical applications, data, and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization.

Identity & Access Management involves protecting data assets and implementing processes, tools and standards to run business efficiently, and securely; including maintaining regulatory compliance.

The IAM Administrator II will be responsible for access management for state applications, systems and resources while ensuring compliance. This position is responsible for doing research and analysis for possible duplicate accounts. Responsible for going into the back end of the IAM Identity Manager system to perform daily tasks. Support development team with ticket backlog for accounts that need further verification, have incorrect data, and/or need to be transferred to different agencies. Attending team meetings to ensure the analyst is up to date with impacts, system changes, and process changes. It is the responsibility of the IAM Administrator to manage identity and access across state systems by providing the right person, the right access at the right time. Ensure compliance with internal policies, support team standards, security, and regulatory requirements related to identity management.

Qualifications:

The Service Delivery Product Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk. Due to the importance of this position, it is expected that a person supporting IAM has great troubleshooting skills with networking and computer systems, can multitask, and work in a fast paced environment while providing excellent customer service.

Preferred Qualifications

Location Requirements

Candidate must be local.

Candidate Must Be Local

Additional Location Details (City, State) :

Must reside in the State of Colorado.

Information Security Training

Information on Security Training


NOTICE: If you are hired as vendor staff who will have access to state systems or data or as a contractor for one of the state executive branch consolidated agencies, in adherence to Colorado Revised Statute 24-37.5-401, 403, 404, 405, and 406, and Colorado Information Security Policy (CISP) 002, you will be required to self-register and complete information security training, including but not limited to review and acknowledgement of the Acceptable Use of State Data and IT Resource Policy (AUP) (CISP-018), through the consolidated agency contractor information security training site within 30 days of your contract start date and annually thereafter. Should you be awarded this contract, the state agency will provide the contractor information security training site information to you.

Background Verification

Minimum Verification Requirements

Please complete the following verifications with Info Cubic upon candidate's selection. Additional verifications may be identified by the agency.

(Suppliers Only)
To order, click on the link to the right:

Skills Security Active Directory No


Job tags

Contract workFor contractorsWork experience placementLocal area


Salary

All rights reserved