Identity and Access Management Engineer III
Alpharetta, GA (Data Ctr), United States
LexisNexis Risk Solutions
LexisNexis Risk Solutions uses Big Data, proprietary linking and targeted solutions to provide insights that help make organizations more secure and efficient.BASIC FUNCTIONS: This position will analyze risks and help operate the enterprise security program. The analyst shall serve as a contributor to security assessments including controls assessments, vulnerability assessments, compliance assessments, and related initiatives. This position functions as the liaison between the business users and the technical resources to be the primary person responsible to ensure all needs are met.
QUALIFICATIONS:
• 3+ years of IT security experience
• BS Engineering/Computer Science or equivalent experience required
• Licensing/certification preferred (at least one of the following): CISSP, CISM, SANS, GIAC (or related), ethical hacking/penetration tester certification, and/or security risk assessment certification
TECHNICAL SKILLS:
• Solid understanding of Identity Management, Active Directory, RBAC/ABAC
• Understanding and promotion of security policies.
• Implementation of security programs.
• Strong written and verbal communication skills.
• Monitoring of security systems for threats.
• Problem-solving skills.
• Knowledge of security environments.
• Installation/troubleshooting in web-based environments.
• Understanding of industry standards.
• Good oral and written communication skills.
ACCOUNTABILITIES:
• Perform operational duties within the Identity and Access Management realm.
• Assist compliance and promote security policies.
• Take appropriate actions to safeguard company information assets against current and foreseen threats.
• Threat surveillance; identify emerging threats and potential solutions.
• Implement security programs: execute project deliverables as assigned.
• Communicate to affected stakeholders including departments within the organization.
• Maintain program procedures including guidelines and flow diagrams to be implemented on an ongoing basis.
• Communication and outreach: maintain communication with peers throughout the organization and security contacts including Business Units and subsidiary locations; disseminate information regarding security controls and newly identified risks.
• Assess and measure security programs to ensure closed-loop operations.
• Monitoring: review security events for anomalous activity to safeguard company information assets against current and foreseen threats.
• Support assignments involving the execution of a series of related tasks in LAN and WAN environments.
• Remain current on industry standards for security in a technology environment.
• All other duties as assigned.
We are committed to providing a fair and accessible hiring process. If you have a disability or other need that requires accommodation or adjustment, please let us know by completing our Applicant Request Support Form or please contact 1-855-833-5120.
Criminals may pose as recruiters asking for money or personal information. We never request money or banking details from job applicants. Learn more about spotting and avoiding scams here.
Please read our Candidate Privacy Policy.
We are an equal opportunity employer: qualified applicants are considered for and treated during employment without regard to race, color, creed, religion, sex, national origin, citizenship status, disability status, protected veteran status, age, marital status, sexual orientation, gender identity, genetic information, or any other characteristic protected by law.
USA Job Seekers:
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Banking CISM CISSP Compliance Computer Science Ethical hacking GIAC IAM Monitoring Privacy Risk assessment SANS Security assessment Surveillance
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.