Cybersecurity IAM Engineer

HYBRID - INFORMATION SERVICES, United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

OhioHealth

OhioHealth is a family of not-for-profit hospitals and healthcare facilities that has been serving central Ohio since 1891. Discover the difference WE can make.

View all jobs at OhioHealth

Apply now Apply later

We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more – in our careers and in our communities.

Job Description Summary:

The Cybersecurity Identity Access Management (IAM) Engineer will report to the Cybersecurity Functional Leader and will not have direct reports. They are responsible for serving as a security expert within their respective cybersecurity specialty, applying their extensive knowledge to implement applications and technology. The Cybersecurity IAM Engineer collaborates closely with Cybersecurity Engineers, business analysts, architects, vendor partners, and other teams within the IT organization to ensure the security of complex applications and services.
This role is tasked enforcing security controls for applications or service architectures, which safeguard the integrity and security of the application environment. Additionally, the Cybersecurity IAM Engineer will maintain daily operations, assist with assigned project work, conduct design reviews, analyze results, and provide recommendations to deliver quality products. The Cybersecurity IAM Engineer analyzes user access needs, develop access roles and add/c

Responsibilities And Duties:

25% Operational Support – Serves as a technical expert related to the security processes, applications and solutions. This support will complement the other support services within the organization.
20% Security Expertise - Serves as the deep technical expert for Cybersecurity principles spanning Cybersecurity use cases.  Applies security knowledge to identify and assess risk, develop create and secure solutions to protect enterprise data and systems.  Adapts to new and emerging technologies.
15% Leads Initiatives - Guides teams through technical issues and challenges. Leads technology change to deliver security and secure business outcomes while also virtually leveraging subject matter experts from any other needed technical area.  Oversees, or consults on, technology implementation and modification activities (for example, projects and products), particularly for new or shared solutions.
15% Collaboration - Works with architects, Business Analysts, Product Owners and peers providing technical expertise by integrating security controls to ensure the security and integrity of the application environment.  Reviews and provides security input into architectural designs and requirements.
10% Technical Documentation - Creates, reviews, and approves technical documentation for applications supported and providing specifications for vendors.
10% Research and Analysis - Analyzes, plans, justifies, schedules, and coordinates the implementation and maintenance of the specialty area’s administrative, operational, and financial initiatives including TCO, optimization, and efficiency.
5% Technology Strategy - Support development of technology strategies and roadmaps within a given area of specialty including design, documentation, communication, and implementation of new or existing standards for infrastructure technologies while remaining current on industry trends.

Minimum Qualifications:

Bachelor's Degree: Computer and Information Science

Additional Job Description:

  • Degree, or equivalent experience
  • Field of Study/Experience: Computer Science, Information Systems, Mathematics, or Engineering
  • 3+ years of experience in or supporting Identity and Access Management
  • 3+ years of experience with Active Directory and Domain management and maintenance
  • 1+ years of experience with Privileged Management, Cloud Identity Management, Remote Access solutions and Certificate management.

SPECIALIZED KNOWLEDGE

  • Knowledge of IT service management (ITSM) and Information Technology Infrastructure Library (ITIL).
  • Knowledge of IT standards and controls.
  • Understanding of information principles and processes.
  • Understanding of system development life cycle methodologies (such as waterfall, spiral, agile software development, rapid prototyping, incremental, synchronize and stabilize, and DevOps).
  • Understanding of security controls for cloud, systems, networks, data controls, and designs.
  • Deep knowledge of information assurance (IA) principles and organizational requirements to protect confidentiality, integrity, availability, authenticity, and non-repudiation of information and data.
  • Understanding of identity and access management systems, processes, and governance.
  • Knowledge of response and recovery methods and processes, multifactor authentication, and single sign-on.
  • Understanding of security standards including HIPAA, CIS, NIST, ISO, and HITRUST.
  • Understanding of Identity and Access Management concepts, technologies, and frameworks.
  • Hands-on experience with IAM tools and platforms.
  • Proficiency in SQL and PowerShell for querying and manipulating identity-related data.
  • Excellent problem-solving and analytical skills, with the ability to think critically and make sound decisions.
  • Strong communication and collaboration skills, with the ability to work effectively with cross-functional teams.
  • Assist with vendor relationships and any evaluation or recommendations related to new vendors and technologies.
  • Collaborate with cybersecurity team to investigate and mitigate IAM-related security incidents.
  • Oversee the support and operations of Privileged Access Management solutions and Remote Access.
  • Establish and enforce IAM governance policies to ensure compliance with security standards and regulatory requirements.
  • An understanding of IAM principles, strong technical skills, and a passion for delivering high-quality security solutions.

DESIRED ATTRIBUTES

  • Is adaptable to new technology.
  • Forward-thinking, with ability to be strategic when looking at future technology.
  • Possesses a continuous-learner mindset.
  • Demonstrated ability to work well with others.
  • Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP).
  • Experience with SailPoint and NERM.
  • Understanding of User provisioning and maintenance in EPIC. 
  • Experience with identity governance, SSO, SAML and, MFA.
  • Familiarity with scripting and automation tools (e.g., PowerShell, Azure Automation, SQL).
  • Experience with Privileged Management, Entra ID, Remote Access solutions, Certificate management and Identity Governance solutions.

Work Shift:

Day

Scheduled Weekly Hours :

40

Department

Information Security

Join us!
... if your passion is to work in a caring environment
... if you believe that learning is a life-long process
... if you strive for excellence and want to be among the best in the healthcare industry

Equal Employment Opportunity

OhioHealth is an equal opportunity employer and fully supports and maintains compliance with all state, federal, and local regulations. OhioHealth does not discriminate against associates or applicants because of race, color, genetic information, religion, sex, sexual orientation, gender identity or expression, age, ancestry, national origin, veteran status, military status, pregnancy, disability, marital status, familial status, or other characteristics protected by law. Equal employment is extended to all person in all aspects of the associate-employer relationship including recruitment, hiring, training, promotion, transfer, compensation, discipline, reduction in staff, termination, assignment of benefits, and any other term or condition of employment 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Active Directory Agile Automation Azure C CCSP Certificate management CISSP Cloud Compliance Computer Science DevOps Governance HIPAA HITRUST IAM ITIL Mathematics NIST PowerShell Prototyping SailPoint SAML Scripting SQL SSO Strategy

Perks/benefits: Career development Health care Wellness

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.