Job Family: Information Technology

Designs, analyzes and supports the company's information technology structure, systems and processes. Acquires, designs, implements and operates the company's information technology resources (e.g., computer hardware, operating systems, communications, software applications, data, databases, etc.). Deploys, acquires, maintains and ensures security of information technology assets. Plans and tests processes to ensure compliance with system requirements, business objectives, security standards and other technical requirements.

Job Function: Information Security

Develops, manages and operates security services that assess, prioritize and mitigate information security and technology risk. Includes cyber security threat services, access management services and technology risk assessments. Designs network security perimeter architecture and relevant security controls. Reviews internal and external IT projects and applications for risk and adherence to security policies and industry best practices. Participates on internal security project teams to deploy security technologies and to make recommendations for hardware/software products for future release. Liaises with vendors for various security infrastructure-related products and services.

Summary of Responsibilities:

The IAM Analyst implements requests for system access in accordance with established policies and procedures. Works with various platforms to ensure that appropriate levels of security are granted, modified, and removed as requested. Platforms include Mainframe, Windows, Internal Custom Applications and various third party web applications. Notifies end users of access request status, implementation, and completion.

Essential Functions:

  • Responds to and completes system access requests for various platforms
  • Ensures compliance with all Corporate Security access approval procedures and policies
  • Escalates access requests where necessary and resolve issues with requests
  • Communicates request status to all internal clients on a timely basis

Other Functions:

  • Special projects as requested.
  • Other duties as assigned.


  • Education –
    • Bachelor's Degree: in Information Systems, Information Technology, Computer Science or
      equivalent field
      or equivalent work experience
  • Experience –
    • 0-3 years experience in Access Administration 
    • Strong analytical and organizational skills
    • Strong customer services skills
    • Ability to build strong relationships with internal customers that result in positive support of the Security Administration processes.
    • Self-motivated and results oriented, including ability to prioritize several conflicting demands.
  • Skills & Abilities –
    • Possess the ability to perform under pressure in a challenging environment in an ever evolving industry
    • Possess a highly developed sense of personal accountability and follow-through with an ability to effectively prioritize multiple personal tasks, projects and goals
    • Experience in log review and event analysis

Working Conditions:

  • Frequently: Minimal physical effort such as sitting, standing, and walking.
  • Occasional moving and lifting of equipment and furniture is required to support onsite and offsite meeting setup and teardown.
  • Physically capable of lifting up to fifty pounds, able to bend, kneel, climb ladders.

Employer’s Rights:

  • This job description does not list all the duties of the job.  You may be asked by your supervisors or managers to perform other duties.  You will be evaluated in part based upon your performance of the tasks listed in this job description.
  • The employer has the right to revise this job description at any time.  This job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason.