IAM Security Analyst
Listed on 2025-12-13
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Position Title: IAM Security Analyst
About UsAt Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code.
Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company.
We realize people do not fit into neat boxes. We are looking for curious and empathetic individuals who are committed to developing themselves and learning new skills, and we are ready to help you do that. We cannot complete our mission without building a diverse and inclusive team. We hire the best people based on an evaluation of their potential and support them throughout their time e join us!
Available Locations: Austin
About the DepartmentSecurity at Cloudflare is a diverse, focused team committed to helping secure both Cloudflare and our customers. The Enterprise Identity & Access Management team is a core pillar of our cybersecurity organization, securing our environment and enabling workforce productivity.
AboutThe Role
As an Identity and Access Management (IAM) Security Analyst you will play a key role in efficiently managing user identities and access across the enterprise. You will be responsible for implementing technologies and designing processes to ensure users have authorized access to resources and systems.
What You’ll Do- Establish and execute access governance programs and policies
- Define and enforce access control policies, including role-based access control (RBAC), attribute based access control (ABAC), and policy based access controls (PBAC)
- Ensure access adheres to the principle of least privilege and segregation of duties (SoD).
- Develop and execute an access certification program and scale to all systems
- Design, implement, and manage Identity Access & Governance policies and procedures.
- Define and enforce privileged access management (PAM) policies to secure sensitive systems and data.
- Manage user onboarding, offboarding, and role changes, ensuring adherence to security policies and compliance requirements.
- Collaborate with cross-functional teams, including IT, security, and compliance, to ensure IAM aligns with business goals.
- Communicate IAM-related updates and recommendations to stakeholders.
- Maintain comprehensive documentation of IAM policies, processes, and configurations.
- Generate reports and metrics related to IAM activities and security posture.
- Stay current with industry best practices, regulations, and compliance standards related to IAM, such as Fed Ramp, SOX, GDPR, PCI, and NIST.
- Provide operational support of IAM systems including an on-call rotation that may include after hours calls
- In-depth understanding of access governance
- Experience in Identity Governance & Administration (IGA) solutions
- Performing policy enforcement, role management, and access certifications
- Experience implementing privileged access management (PAM)
- Experience developing IAM security standards and policies
- Preferred background in scripting and/or application development to automate identity and access management processes.
We’re not just a highly ambitious, large-scale technology company. We’re a highly ambitious, large-scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet.
Project Galileo:
Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).