Cyber Posture Management Analyst I
Lansing, MI, United States
If you are an internal associate, please login to Workday and apply through Jobs Hub.
Job Purpose
The Cyber Posture Mgmt. Analyst I, as a part of Jackson Information Security & Privacy, provides security analysis for the company's Identity and Access Management (IAM) Operation's program. This role requires knowledge across multiple platforms, applications, processes, and procedures to enable access management of business initiatives across the enterprise.
Essential Responsibilities
Familiar with identity and access management, with a focus on Privileged Access Management (PAM), Multi-Factor Authentication (MFA), and Identity Governance and Administration (IGA).
Knowledge of scripting languages (e.g., PowerShell, Python) for automation and customization of IAM solutions.
Understanding of identity protocols and technologies: OpenID Connect (OIDC,) OAuth, SAML, AD-Fed, API Gateways, SCIM, and platforms such as, Sailpoint, CyberArk, and MS Entra.
Knowledge of identity & access management vulnerabilities, threats and mitigations.
Ability to determine how a security system works (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Familiar with modern software life cycle development and automated cloud infrastructure deployment.
Understanding of network architecture, operating systems, and security protocols.
Ability to work independently and collaboratively in a fast-paced environment.
Supports initiatives and projects that will improve the organization’s cyber posture.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Understanding of security controls, risk management, and regulatory compliance (NIST CSF/SOX/GDPR/etc.).
Other Duties
Extended hours, including on-call may be required.
Performs other duties and/or projects as assigned.
Knowledge, Skills and Abilities
Ability to receive and incorporate feedback.
Strong verbal and written communication skills.
Strong attention to detail.
Strong interpersonal, analytical, and problem-solving skills.
Flexibility in day-to-day work.
Ability to learn the company’s supported systems and their interfaces with other systems.
Strong knowledge of Microsoft software applications.
Ability to communicate technical concepts in an understandable fashion.
Ability to prioritize multiple tasks and execute efficiently and effectively while demonstrating a clear sense of urgency when appropriate.
Excellent customer service focus and skills.
Ability to collaborate effectively in a team environment to achieve desired results.
Scripting knowledge preferred.
Qualifications
Bachelor's Degree or equivalent experience and/or education required.
1+ years knowledge of financial products, regulatory requirements, and business process preferred.
Cloud Identity experience preferred.
SC-300 Microsoft Certified Identity and Access Administrator Associate preferred.
CISSP Certified Information Systems Security Professional preferred.
We don't just accept difference - we celebrate it, we support it, and we thrive on it for the benefit of our employees, our products and our community. Jackson is proud to be an equal opportunity workplace. The Company subscribes to and endorses federal and state laws and regulations relating to equal employment opportunity for all persons without regard to race, color, religion, gender, age, national origin, legally-recognized disability, marital status, legally-protected medical condition, citizenship, ancestry, height, weight, sexual orientation, veteran status, or any other factor not related to the needs of the job. The Company is committed to a policy of equal opportunity. Company facilities and campuses are tobacco-free environments.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Automation CISSP Cloud Compliance Cyberark GDPR Governance IAM NIST OpenID PowerShell Privacy Python Risk management SailPoint SAML Scripting Security analysis SOX Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.