Sr IT Security Analyst

ATM-Dallas Lincoln II

The ideal candidate will:

  • Design and define user roles and access levels for SAP environments based on business needs and security policies.

  • Develop and document SAP role definitions, including permissions and entitlements.

  • Implement and configure role-based access controls (RBAC) within IAM and SAP systems.

  • Ensure SAP system security by managing user roles and access controls.

  • Conduct regular security assessments and audits of SAP roles and permissions.

  • Administer and manage user roles within IAM and SAP systems, ensuring accurate and efficient role assignments.

  • Provide support and troubleshooting for role-related issues and access requests in SAP environments.

  • Ensure compliance with regulatory requirements and internal policies through regular audits and documentation.

  • Collaborate with SAP functional and technical teams to understand security requirements and implement solutions.

  • Identify and implement opportunities for continuous improvement in role management processes and SAP security practices.

THIS JOB DESCRIPTION DOES NOT ATTEMPT TO LIST ALL OF THE DUTIES THAT ARE OR MAY BE PERFORMED IN THIS POSITION

Primary Duties

1. Provides troubleshooting assistance to users regarding complex security and access issues.

2. Partners with users and internal/external staff to monitor reports and departmental level security access within applications or systems.

3. Reviews reports, statistics, and interacts with customers and recommends changes to management.

4. Provides one-on-one training and day to day guidance to users and less experienced IT analysts and peers.

5. Maps and reviews workflows in provisioning users into our systems and infrastructure. Recommends and makes application configuration changes as needed.

6. Identifies and recommends provisioning and Identity Access Management process changes that improve productivity and customer service.

7. Reviews and approves access requests. Provides Role Based Access Control (RBAC) to individual users and performs recertification based on segregation of duties and roles.

8. Complies with internal and external audit requests. Provides data for audit indicating changes made to access control lists to facilitate audits and other investigations.

9. Provides support, guidance, and mentorship for IT Security Analysts. Reviews Analyst productivity and recommends changes as needed.

10. Provides technical advisement internally across the Enterprise.

11. Monitors the effectiveness of the Enterprise-wide information security program.

12. Applies Information Technology security methodologies, policies, procedures and standards as directed to protect information availability and integrity. Documents changes and provides team leadership as necessary.

13. Stays abreast of hardware, software and methodologies regarding data security and access control.

14. Along with leadership recommends and implements new IT access tools and process improvements.


MINIMUM REQUIREMENTS & SKILLS

Educational/Experience Level

1. Bachelor's degree in Computer Science, Information Technology, MIS, Business or related field and three years of related technical experience; or

2. Associate's degree in Computer Science, Information Technology, MIS, Business and five years related technical experience; or equivalent.

3. Prior leadership experience welcome.

4. Experience with Identity Governance & Lifecycle tools such as RSA, Okta, and Ping a plus. Experience with AD end user computer is also a plus.


Communication Skills

Requires the ability to communicate with internal and/or external customers in order to obtain and/or provide explanations and/or modifications on technical or other complex concepts to individuals with little or no background in the area under discussion. Requires emotional awareness when reporting to management and leadership.

Numeric Skills

Requires the ability to perform analyses involving ratios, percentages and simple statistical methods.

Computer Skills

Requires advanced knowledge of various software applications for creating documents, reports and/or graphics.

Work Conditions

Works in an indoor environment.

Requires frequently performing activities, including, but not limited to, stooping, bending, crawling, kneeling, grasping, reaching, climbing and lifting objects in excess of 100 pounds (e.g. lifting and pulling rolls of pipe).

Atmos Energy Corporation is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, or veteran status.

Job Family:

Infrastructure

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Audits Compliance Computer Science Governance IAM Okta RSA SAP Security assessment

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.