Job Directory IAM Data Security Specialist

IAM Data Security Specialist
Addison, TX

Companies like
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.

About

Job Description

Job Description:

The Access Management Operations (AMO) function within CSD is responsible for enabling simplification of our access processes, standardizing solutions and risk reduction across the enterprise, as well as collaborating with internal partners to encourage adoption of the bank's cybersecurity standards by external stakeholders.

Access Management Client Services team is seeking for a Support Analyst who will be responsible for providing technical and administrative support for access management tools, platform and application access and access reviews. The analyst will be able to perform troubleshooting, provide advice and solution to any access related issues. Coordinates the reporting of data security incidents. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors.

The successful candidate will possess a minimum of 3-5 years IT support experience. A risk oriented perspective is required along with the ability to support access management processes. Self-starter and highly analytical thinker required. Ability to work well in teams as well as enterprise end-user and business partners to support and enhance Access Client experience. Utilizes technical and business process knowledge to support secure, risk-based practices, exercising judgment within broadly defined practices and policies.

Required Skills:

* Detailed, bank specific access administration knowledge in Windows, Midrange and Mainframe Platforms with emphasis on security and access controls.
* Strong analytical skills/problem solving/conceptual thinking.
* Ability to work with Technical and Non-Technical business owners
* Communicates effectively and confidently with all clients.
* Works well with others and collaborates productively to get things done.
* Deep experience with Identity and Access Management as a focus area within Information Security.
* Ability to navigate and work effectively across a complex, geographically dispersed organization.
* Experience leading complex technical projects, meeting target timelines, facilitating project meetings, authoring project documentation, issue resolution, and project resource identification.
* Excellent process design capability to improve overall efficiency, mitigate resource conflicts, and improve customer/client experience
* Demonstrable ability to self-direct project outcomes, with minimal supervision to achieve program goals
* Previous experience in Information Technology / Information Security / Identity and Access Management
* Ability to identify, analyze and address problems to resolve issues whenever possible in a way that minimizes negative impact and risk to the organization
* Ability to work independently on initiatives with little oversight. Motivated and willing to learn.
* Ability to be comfortable delivering messages across a wide spectrum of individuals having varying degrees of technical understanding
* Strong leadership skills and qualities which enable you to work with peers and various levels of management
* Microsoft Office Proficient (Excel, Word, Outlook, Visio, PowerPoint, Etc.)
* Proven ability of risk oriented approach
* Good interpersonal and communication skills

Desired Skills:

* Strong reporting and documentation skills including experience in Microsoft Visio
* Effective communication skills
* Ability to work in a complex matrix environment
* Self-motivated and a strong team player
* Ability to quickly grasp the business needs and be able to adapt to the changes



Enterprise Role Overview: As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to the client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Monitors existing and proposed security standard setting groups. State and Federal legislation and regulations. Identifies and escalates changes that will affect information security policy, standards and procedures. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Posting Date: 06/06/2019

Location: Addison, TX, 16001 N Dallas Pkwy (TX8044), - United States

Travel: Yes, 5% of the time

Full / Part-time: Full time

Hours Per Week: 40

Shift: 1st shift

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.