We are more than a health system. We are a belief system. We believe wellness and sickness are both part of a lifelong partnership, and that everyone could use an expert guide. We work hard, care deeply and reach further to help people uncover their own power to be healthy. We inspire hope. We learn, grow, and achieve more – in our careers and in our communities.
Job Description Summary:
The Cybersecurity Identity Access Management (IAM) Analyst will report to the Cybersecurity Functional Leader and will not have direct reports. They are responsible for serving as a security expert within their respective cybersecurity specialty, applying their extensive knowledge to implement applications and technology. The Cybersecurity IAM Analyst collaborates closely with Cybersecurity Engineers, business analysts, architects, vendor partners, and other teams within the IT organization to ensure the security of complex applications and services. This role is tasked enforcing security controls for applications or service architectures, which safeguard the integrity and security of the application environment. Additionally, the Cybersecurity IAM Analyst will maintain daily operations, assist with assigned project work, conduct design reviews, analyze results, and provide recommendations to deliver quality products. The Cybersecurity IAM Analyst analyzes user access needs, develop access roles and add/change/delete user access accordingly, through provisioning tool(s) or directly in system / application. Assist in special projects, such as application go-lives, upgrades, enhancements, etc.Responsibilities And Duties:
45% Operational Support – Serves as a technical expert related to the security processes, applications and solutions. This support will complement the other support services within the organization.10% Security Expertise - Serves as the technical expert for Cybersecurity principles spanning Cybersecurity use cases. Applies security knowledge to identify and assess risk, develop create and secure solutions to protect enterprise data and systems. Adapts to new and emerging technologies.
10% Collaboration - Works with architects, Business Analysts, Product Owners and peers providing technical expertise of current security controls to ensure compliance to our security standards.
10% Technical Documentation - Creates, reviews, and approves technical documentation for applications supported and providing specifications for vendors.
10% Research and Analysis - Analyzes, plans, justifies, schedules, and coordinates the implementation and maintenance of the specialty area’s administrative, operational, and financial initiatives including TCO, optimization, and efficiency.
5% Technology Strategy - Support development of technology strategies and roadmaps within a given area of specialty including design, documentation, communication, and implementation of new or existing standards for infrastructure technologies while remaining current on industry trends.
5% Leads Initiatives - Guides teams through technical issues and challenges. Assist with technology changes to deliver security and secure business outcomes while also virtually leveraging subject matter experts from any other needed technical area. Oversees, or consults on, technology implementation and modification activities (for example, projects and products), particularly for new or shared solutions.
As a High Reliability Organization (HRO), responsibilities require focus on safety, quality and efficiency in performing job duties.
The job profile provides an overview of responsibilities and duties and is not intended to be an exhaustive list and is subject to change at any time
Minimum Qualifications:
Bachelor's Degree: Computer and Information ScienceAdditional Job Description:
- Degree, or equivalent experience
- Field of Study/Experience: Computer Science, Information Systems, Mathematics, or Engineering
- 1+ years of experience in or supporting Identity and Access Management
- 1+ years of experience with Active Directory
SPECIALIZED KNOWLEDGE
- Experience administering and building new security roles, classes and / or rules within an IAM tool and / or appropriate system(s) or application(s) based on customer needs and compliance approval; maintain documentation accordingly.
- Understanding of IAM concepts, technologies, and frameworks.
- Hands-on experience with IAM tools and platforms.
- Proficiency in SQL and PowerShell for querying and manipulating identity-related data.
- Excellent problem-solving and analytical skills, with the ability to think critically and make sound decisions.
- Strong communication and collaboration skills, with the ability to work effectively with cross-functional teams.
- Assist with vendor relationships and any evaluation or recommendations related to new vendors and technologies.
- Collaborate with cybersecurity team to investigate and mitigate IAM-related security incidents.
- Oversee the support and operations of Privileged Access Management solutions and Remote Access.
- Establish and enforce IAM governance policies to ensure compliance with security standards and regulatory requirements.
- An understanding of IAM principles, strong technical skills, and a passion for delivering high-quality security solutions.
DESIRED ATTRIBUTES
- Is adaptable to new technology.
- Forward-thinking, with ability to be strategic when looking at future technology.
- Possesses a continuous-learner mindset.
- Demonstrated ability to work well with others.
- Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP).
- Experience with SailPoint and NERM.
- Understanding of User provisioning and maintenance in EPIC.
- Experience with identity governance, SSO, SAML and, MFA.
- Familiarity with scripting and automation tools (e.g., PowerShell, Azure Automation, SQL).
- Experience with Privileged Management, Entra ID, Remote Access solutions, Certificate management and Identity Governance solutions.
Work Shift:
DayScheduled Weekly Hours :
40Department
Information SecurityJoin us!
... if your passion is to work in a caring environment
... if you believe that learning is a life-long process
... if you strive for excellence and want to be among the best in the healthcare industry
Equal Employment Opportunity
OhioHealth is an equal opportunity employer and fully supports and maintains compliance with all state, federal, and local regulations. OhioHealth does not discriminate against associates or applicants because of race, color, genetic information, religion, sex, sexual orientation, gender identity or expression, age, ancestry, national origin, veteran status, military status, pregnancy, disability, marital status, familial status, or other characteristics protected by law. Equal employment is extended to all person in all aspects of the associate-employer relationship including recruitment, hiring, training, promotion, transfer, compensation, discipline, reduction in staff, termination, assignment of benefits, and any other term or condition of employment
Remote Work Disclaimer:
Positions marked as remote are only eligible for work from Ohio.