Description:
Job Description:
The Secrets Management Technical Analyst is responsible for discovering compiling researching analyzing and documenting data requirements workflows controls and business processes within Enterprise Security Product & Services. This role serves as a subject matter expert and liaison across technical and business teams supporting cybersecurity compliance and secure credential handling practices. The analyst will support Secrets Management operations ensuring rapid remediation of exposed credentials identified by automated scanning tools.
Key Responsibilities:
Discover Review validate and analyze alerts generated by secret scanning platforms to identify insecurely stored or exposed secrets.
Support Non Human Identity (NHI) management including governance lifecycle oversight and alignment of system/service accounts with enterprise security policies.
Monitor and enforce secret rotation compliance ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
Coordinate with application teams business owners system owners and engineering partners to remediate compromised credentials and enforce secure rotation workflows.
Collaborate with security engineers to validate findings confirm ownership and assess the impact of policy or process changes.
Track findings end to end ensuring timely resolution and accurate attribution of ownership.
Assist in improving scanning accuracy and optimizing discovery and remediation pipelines in partnership with engineering teams.
Serve as liaison between IAM and business partners to ensure cohesive remediation and secure credential usage practices.
Prepare and deliver metrics and dashboards related to exposed secrets mean time to detect/remediate repeat offenders and security posture trends.
Support Non Human Identity (NHI) management including governance lifecycle oversight and alignment of system/service accounts with enterprise security policies.
Monitor and enforce secret rotation compliance ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
Maintain procedural documentation and create automation runbooks
Qualifications:
Bachelors Degree in Information Technology Cybersecurity or other related field or the equivalent combination of education training or experience
Knowledge of IT policies security procedures and identity governance frameworks.
Understanding of foundational security concepts (AAA authentication fundamentals Zero Trust).
Experience with secret scanning technologies automated discovery tools or credential hygiene workflows.
Familiarity with IAM concepts incident response processes and secure access management for Enterprise Security Product & Services.
Desired Qualifications
Experience generating security metrics supporting risk mitigation or assembling audit evidence.
Exposure to Privileged Access Management (PAM) tools such as CyberArk.
Ability to translate technical findings into clear actionable business recommendations.
Process improvement mindset with a focus on security quality and operational efficiency.
Ability to serve as a trusted advisor to development infrastructure and business teams.
Experience with secret management on the Multicloud (AWS OCI Azure)
Additional Details
- Hybrid Status : FT Remote
- Alternate Job Title : Technical Analyst
- ETS Contractor Titles : Analytics - Tech Product Analyst
- Contractor Experience Level : 3
Description: Job Description: The Secrets Management Technical Analyst is responsible for discovering compiling researching analyzing and documenting data requirements workflows controls and business processes within Enterprise Security Product & Services. This role serves as a subject matter exp...
Description:
Job Description:
The Secrets Management Technical Analyst is responsible for discovering compiling researching analyzing and documenting data requirements workflows controls and business processes within Enterprise Security Product & Services. This role serves as a subject matter expert and liaison across technical and business teams supporting cybersecurity compliance and secure credential handling practices. The analyst will support Secrets Management operations ensuring rapid remediation of exposed credentials identified by automated scanning tools.
Key Responsibilities:
Discover Review validate and analyze alerts generated by secret scanning platforms to identify insecurely stored or exposed secrets.
Support Non Human Identity (NHI) management including governance lifecycle oversight and alignment of system/service accounts with enterprise security policies.
Monitor and enforce secret rotation compliance ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
Coordinate with application teams business owners system owners and engineering partners to remediate compromised credentials and enforce secure rotation workflows.
Collaborate with security engineers to validate findings confirm ownership and assess the impact of policy or process changes.
Track findings end to end ensuring timely resolution and accurate attribution of ownership.
Assist in improving scanning accuracy and optimizing discovery and remediation pipelines in partnership with engineering teams.
Serve as liaison between IAM and business partners to ensure cohesive remediation and secure credential usage practices.
Prepare and deliver metrics and dashboards related to exposed secrets mean time to detect/remediate repeat offenders and security posture trends.
Support Non Human Identity (NHI) management including governance lifecycle oversight and alignment of system/service accounts with enterprise security policies.
Monitor and enforce secret rotation compliance ensuring credentials are rotated according to policy and assisting teams in meeting regulatory and internal rotation requirements.
Maintain procedural documentation and create automation runbooks
Qualifications:
Bachelors Degree in Information Technology Cybersecurity or other related field or the equivalent combination of education training or experience
Knowledge of IT policies security procedures and identity governance frameworks.
Understanding of foundational security concepts (AAA authentication fundamentals Zero Trust).
Experience with secret scanning technologies automated discovery tools or credential hygiene workflows.
Familiarity with IAM concepts incident response processes and secure access management for Enterprise Security Product & Services.
Desired Qualifications
Experience generating security metrics supporting risk mitigation or assembling audit evidence.
Exposure to Privileged Access Management (PAM) tools such as CyberArk.
Ability to translate technical findings into clear actionable business recommendations.
Process improvement mindset with a focus on security quality and operational efficiency.
Ability to serve as a trusted advisor to development infrastructure and business teams.
Experience with secret management on the Multicloud (AWS OCI Azure)
Additional Details
- Hybrid Status : FT Remote
- Alternate Job Title : Technical Analyst
- ETS Contractor Titles : Analytics - Tech Product Analyst
- Contractor Experience Level : 3
View more
View less