Professional work that implements, maintains and troubleshoots enterprise security systems in a complex, integrated information technology systems environment. Consults with internal business customers to determine security requirements. Provides technical advice and counsel to less experienced analysts.
Required to assist in maintaining 24 X 7 systems availability.
- May monitor the work of others and provide some coaching and mentoring.
- Implements, maintains and troubleshoots software systems.
- Performs security audits, risk assessment and analysis.
- Tests software systems.
- Makes recommendations for enhancing and formulating policies and procedures.
- Consults with internal customers to identify and analyze needs and recommends solutions that meet business goals.
- Resolves problems and provides technical assistance and training to users in software enhancements and upgrades.
- Performs or ensures system administration tasks, including adding users, user groups and accounts are successfully accomplished.
- Analyzes, diagnoses, troubleshoots and resolves software and production issues.
- Writes or modifies basic scripts and performs light programming to resolve performance problems and automate systems administration tasks.
- Resolves escalated problems and identifies and recommends responses to new or unusual situations.
- Ensures system documentation and logs are maintained and procedures are documented.
- Reviews research data; and performs or ensures testing and evaluation of vendor hardware, software and other system components is performed as required.
- Manages vendor relationships.
- Ensures that plans and procedures for operating under both normal and emergency conditions are accurate, appropriate and up-to-date.
- Promulgates and enforces established technical and procedural standards.
- Assists in disaster recovery testing.
- Resolves escalated problems, responds to new and unusual situations and recommends solutions to systemic problems.
- Participates in ongoing training to continuously upgrade technical knowledge and skills.
- Performs other job-related tasks as assigned.
IDENTITY ACCESS MANAGEMENT (IAM)
The following are in addition to the general specification description for this classification.
KNOWLEDGE, SKILLS, AND ABILITIES:
Knowledge of:
- JEA’s IAM processes to include account management, access controls, and access governance.
- Modern approaches with implementing delivery of IAM services and applications.
- Cloud based services and architecture such as iDaas, iPaas, AWS, AZURE, and Office365
- Role-based access control, API Gateways, Enterprise Directories, Enterprise Databases, Active Directory, LDAP, and Single Sign-On
- End-User provisioning, Identity and access governance, and identity data synchronization services and systems.
- Scripting languages such as JavaScript, Beanshell, LUA, and Groovy.
- Access management, sufficient to work across organizational lines to resolve problems and issues.
Skill in:
- Maintaining JEA’s Identity and Access Management systems to include but not limited to configuration, systems integration, and troubleshooting.
- CIP audit processes and procedures, including controls testing and remediation activities.
- Delivering quality work on time and demonstrating a high level of efficiency and attention to detail.
- Communicating, both written and verbal, and be able to effectively communicate with technical and non-technical stakeholders.
- Identity Lifecycle Management
- Identity Data Models
- Access Lifecycle Management
- Credential Management
- Identity Federation
Ability to:
- Analyze complex problems and develop innovative solutions.
- Create and improve existing procedures to ensure alignment with IAM processes with the company’s business strategy.
- Lead projects, including the management of resources, timelines, and expectations.
- Operate independently at times to provide domain area functional and technology leadership
EXAMPLES OF PROFESSIONAL WORK:
- Respond to evidence requests in support of regulatory compliance.
- Implements, tests, debugs, and documents new systems, or enhances existing systems.
- Reviews and coordinates test plans for new and existing environments.
- Works independently to implement complex hardware and software environments.
- Develops and implements testing processes and scripts in support of upgrades and enhancement changes.
- Interfaces with peers, technical & business staff, vendors, customers, and all levels of management.
- Writes scripts, templates, interfaces, and utility applications as needed to maximize efficiency and target continuous improvement.
- Provides technology and process training within discipline.
- Assists Project and Program Managers as needed.
- Performs, or ensures, that system administration tasks, including adding users, user groups and accounts are successfully accomplished.
OPEN REQUIREMENTS:
Bachelor of Science (BS) degree in Computer Science, Information Security, or related discipline and four (4) years of professional experience in a security analyst role in a large corporate environment.
-OR-
Eight (8) year combination of related education, training and experience in a large corporate environment.
Windows: Five (5) years of experience must be in a Windows environment.
LICENSE/CERTIFICATION/REGISTRATION:
- A valid driver’s license is required prior to employment and must be maintained during employment in this classification.
- Minimum of two (2) or more Information Security Certifications (eg., Security+, CISSP, CIAM), or Cloud Based Certifications including AWS and Azure are required.
- Other Certification, Registration and/or Training specific to the job may be required during employment
The full salary range for this position is $85,134.40 - $132,392.00. Salary will vary based on education, experience, skills, and abilities.