Identity & Access Management Security Analyst II
GSC Vertis North, Philippines
Full Time Entry-level / Junior Clearance required USD 29K - 55K *
Global Payments
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This Role
Responsible for the Implementation, Security, Maintenance and Access Administration of Information Security managed technologies, to include access controls across mainframe and distributed platforms. Focus may be in one or more of the following areas, Mainframe, Enterprise Identity and Access Management, HPNSK/Tandem, Identity Administration, and/or Enterprise Role Based Access Control (E-RBAC). Required to understand, adhere and enforce departmental and Corporate Security standards, policies and procedures.
What Part Will You Play?
- Assists with troubleshooting and repairing failed permissions and access levels for multiple Identity and Access Management (IAM) tools, applications and assigned technologies. This ensures appropriate access and meets internal/external data security requirements.
- Reviews routine maintenance reports and violation logs to detect unauthorized access and notifies and assists experienced peers with mitigation techniques of possible threats to corporate, client, and team member security.
- Assists with the analysis, design and deployment of IAM architecture and other security projects to proactively identify and mitigate organizational risk, streamline access management activities, ensure resources are secured, and adapt to changing threat landscapes.
- Progressively builds base knowledge/familiarization by assisting with the creation and maintenance of relevant documentation to include, but not limited to, Standard Operating Procedures, and project change control methodologies.
What Are We Looking For in This Role?
Minimum Qualifications
- Bachelor's Degree
- Relevant Experience or Degree in: Business or IT related field and/or the equivalent of training and experience
- Typically Minimum 2 Years Relevant Exp
- Responsible for the implementation, security, maintenance and access administration of information security managed technologies
- Must have the ability to pass and maintain a government level security clearance
Preferred Qualifications
- Bachelor's Degree
- Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
- Typically Minimum 2 Years Relevant Exp
- Implementation, security, maintenance and access administration of information security managed technologies. Experience supporting UNIX, Windows Server, mainframe and/or HP NonStop systems. Experience with remote administration tools, basic networking concepts, Help Desk support, scripting/programming and/or logical access administration using security products (ACF2, Active Directory, LDAP, Okta etc.).
- Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred
What Are Our Desired Skills and Capabilities?
- Skills / Knowledge - Developing professional expertise, applies company policies and procedures to resolve a variety of issues.
- Job Complexity - Works on problems of moderate scope where analysis of situations or data requires a review of a variety of factors. Exercises judgment within defined procedures and practices to determine appropriate action. Builds productive internal/external working relationships.
- Supervision - Normally receives general instructions on routine work, detailed instructions on new projects or assignments.
- Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problems
- Applications and Systems - Utilizes, configures and monitors security using Identity and Access Management technologies to meet internal and external requirements for data security
- Project Management - Plans, organizes, motivates and controls resources to achieve defined goals
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact jobs@globalpay.com.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory CISM CISSP Clearance Computer Science GIAC GSEC IAM LDAP Mainframe Okta Scripting Security Clearance UNIX Windows
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.