A Brief Overview
The Security System Access Administrator will be responsible for ensuring the security and integrity of our corporate information systems which involves managing user access defining and enforcing access policies and monitoring compliance with security standards. The position will collaborate with crossfunctional teams to implement and maintain effective identity and access management solutions that safeguard sensitive data and protect against unauthorized access. The Security System Access Administrator will audit report on and document access security systems and procedures.
This role is eligible to participate in Zeniths hybrid work schedule which provides the flexibility to work from home on select days of the week according to the inoffice schedule established by regional executive leadership. Selected candidate must be able to report onsite into the Woodland hills CA or Sarasota FL office on a weekly basis.
What you will do
- Responsible for configuration and maintenance of the IAM platform.
- Develop processes in the platform including access entitlements profiles and roles as well as provisioning and deprovisioning access changes to the platform to ensure accurate relevant access control.
- Develop enterprisewide standards for the Identify Management systems and program.
- Plan and lead the IAM standard initiatives and protocol such as OAuth2.0 OIDC SCIM SAML.
- Involve in the research areas such as role engineering and implement standardized formats meeting crossfunctional RBAC needs for the platform.
- Design and implement enterprisewide IAM solutions across multidomain cloud environments focusing on zerotrust principles privileged access management and automated access governance.
- Responsible for ensuring that relevant Privileged Access Management (PAM) Controls are adequately enforced across platforms and applications to comply with IAM Standard.
- Identity Access Governance (IAG) tools such as SailPoint OIM or OKTA.
- Exposure to Azure with a focus on Entra ID.
- User Directories Active Directory LDAP Virtual Director Services.
- Develop Single SignOn patterns and work with partners to implement them.
- Maintain a comprehensive understanding of the organizations user identity lifecycle including enhanced processes for identity creation modification and deletion.
- Partner with Internal Audit and Compliance teams to develop mature IAM security policies.
- Enforce compliance with industry standards regulatory requirements and organizational policies.
- Generate and analyze access reports to identify and mitigate security vulnerabilities.
- Engage senior management to provide factual transparent and timely reporting on existing and emerging PAM or information security risks.
- Supports audit issues for closure and sustainability.
- Works with vendors and partners to develop and administer programs.
- Investigate and resolve accessrelated incidents anomalies or security breaches.
- Provide support for accessrelated issues working closely with IT support and helpdesk teams.
- Implement corrective measures to prevent the recurrence of identified security issues.
- Evaluate implement and manage IAM tools and technologies to improve efficiency.
- Author technical documentation including infrastructure topology system design workflows data flows/mapping implementation steps and user/system support.
- Apply industry best practices as it relates to PAM templates and documentation while also proposing improvements based on practical knowledge.
- Work productively and harmoniously with others on a consistent basis.
- Respond positively to direction and feedback on performance.
- Consistently main professional and appropriate demeanor.
- Perform other duties/projects as assigned.
Education Qualifications
- High School Diploma or equivalent combination of education and experience required.
- Bachelors Degree or equivalent work experience required.
Experience Qualifications
- 57 years of experience in information security with a focus on Identity Access and Management (IGA PAM Authentication Directory Services) required.
- 5 Years IAM operational experience required.
- IAM solutions experience.
- Security workflow/incident management tools and API integrations.
Skills and Abilities
- Strong understanding of directory services authentication and authorization protocols.
- Proficient in scripting languages.
- Strong knowledge of data governance principles data quality frameworks and compliance regulations.
- Basic understanding of PAM and IAM concepts and knowledge.
- Familiarity with network security encryption and data classification.
- Relevant certifications such as CISSP CISM or GSEC are a plus.
Required Experience:
Unclear Seniority