IAM Analyst at ERCOT in Taylor, TXother related Employment listings - Taylor, TX at Geebo

IAM Analyst at ERCOT in Taylor, TX

Summary of Responsibilities Assist the Information Technology (IT) Identity and Access Management (IAM) team with Quarterly Access Verification, ensure compliance, testing for IAM system and daily business operations work. This is an intense position that requires the ability to multi-task and drive results through internal and external departments. The position requires knowledge of JIRA and IAM. Additionally, knowledge of active directory user management, privileged account management and SQL/Oracle database is preferred. This position also requires working closely with numerous teams across the organization. Please note that this position will be required to participate in a 7x24x365 on-call rotation. Essential Job Duties & Responsibilities Quarterly and Annual Access Verification Access Extract Collection Process Access Control List Process Password Aging Review Process Access Authorization Process Testing for IAM system (Oracle):
integration and user acceptance testing Test script development for new application enhancements IAM JIRA Project(s) Ticket creation/tracking/monitoring of onboarding, termination, job change, suspension and reinstatement of employees and contractors Ticket creation/tracking/processing of IAM requests to create/modify/delete an entitlement or role Processing of Special Access Account requests Monitor dashboards IAM Administration IAM Reporting Escalate and resolve priority requests and issues as needed Assist staff as a training resource and point of contact to any personnel that utilizes the Access Management Processes Monitor IAM mailbox for troubleshooting and miscellaneous requests. Update IAM documentation as required. Apply complex technical information and create documentation from diagrams and other input sources. Conduct research into a wide range of issues with proven analytical and problem-solving abilities. Meet aggressive deadlines and perform with poise under pressure with minimal supervision. Responsible for adherence to IT processes and standards across the program. Qualifications & Work Experience Minimum of 5 years (in excess of degree requirements) of progressively responsible experience in compliance (such as NERC or SOC2), identity and access management, privileged account management, security, or technical customer service. Working knowledge of technical support, configuration, and administration of server/hardware required. Experience in an incident management system (JIRA as a ticketing system is preferred). Energetic and ability to learn quickly. Superior attention to detail. Ability to multi-task in a fast-paced environment. Ability to be flexible and adaptive to the program, project priorities and processes. Take initiative and work independently and as team member. Experience with Oracle Identity Manager. Knowledge of Active Directory. Knowledge of privileged account management. Technical background, especially in a delivery capacity interacting with stakeholders. Excellent customer service, written and verbal communication, and facilitation skills. Demonstrated success in efficient collaboration across organizational boundaries. Strong focus on quality and efficiency. Advanced experience in MS Office Suite. EDUCATION:
Bachelor's Degree in Computer Science or related field or an equivalent combination of education and experience is required.
Salary Range:
$100K -- $130K
Minimum Qualification
System & Network Administration, IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.