Project Analyst Security & Compliance
Listed on 2026-02-03
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Data Security
Cleveland State University
Engaged Learning
Oversees Cleveland State Universities ( CSU ) Identity and Access Management ( IAM ) and Identity Management ( IDM ) systems. Responsible for the integrity, security, and compliance of CSU’s access management policies, practices, and processes and ensures all IAM strategies align with CSU’s goals and objectives. Oversees the development and delivery of IAM / IDM security standards, best practices, architecture, and systems to continuously improve identity governance and security across CSU .
Leads cross-functional teams to design and implement effective identity solutions and collaborates closely with campus business partners to safeguard sensitive data while optimizing user experience. Serves on various internal and external committees, ensuring collaboration with stakeholders and improved security posture. Collaborates with IS&T and campus partners to evaluate and adopt solutions and methodologies to support key CSU initiatives and improve security.
Performs other functionally related duties as assigned.
- Bachelor’s degree preferably in computer science, information technology, business administration, or a related field.
- Four (4) years of experience in a data processing environment including systems analysis, auditing, project management and programming.
- Experience in IT security in a large-scale, multi-vendor computer environment.
- Experience in identity and access management including implementation projects in mid-size to larger organizations.
- Requires occasional evening or weekend work and travel to various organizational locations or vendor sites, as necessary.
- Certifications in Certified Information Security Manager ( CISM ), Certified Information Systems Security Professional ( CISSP ), Global Information Assurance Certification ( GIAC ), or equivalent.
- Experience with system security-related products, such as Cisco and cybersecurity experience supporting compliance with legal best practices and regulatory compliance for cloud alternatives.
- Experience with Identity Access Management systems e.g., role-based security, least privilege principle, CIA .
- Experience in operating systems, such as Linux and Windows and SIEM tools, such as Splunk.
- Knowledge of iterative implementation methodologies, such as agile.
- In-depth knowledge of data governance standards, privacy laws e.g., General Data Protection Regulation ( GDPR ), California Consumer Privacy Act ( CCPA ), Gramm-Leach-Bliley Act ( GLBA ), Federal Trade Commission ( FTC ) Safeguards Rule and IAM / IDM data requirements. Proficiency in establishing policies for data integrity, security, and compliance during and after migration. Capacity to collaborate with IS&T leaders to prioritize data governance measures supporting data security and adherence across the organization.
- Knowledge of IAM / IDM data architecture, user provisioning, authentication, authorization, and directory services. Capability to oversee data migration, integration, and system administration of the IAM / IDM tool. Ability to display analytical thinking to extract insights from IAM / IDM tool that assists with management of identity governance and architecture.
- Knowledge of IAM / IDM tool implementation impacts to cross-functional areas e.g., finance, operations, human resources. Proficiency in communicating data governance identity management to executives, department heads, and end-users. Ability to advocate for IAM / IDM initiatives and stakeholder needs.
- Knowledge of data risks e.g., breaches, migration errors and metrics to measure IAM / IDM successes in the various implementation phases. Ability to mitigate risks through security measures and track organizational impact via KPIs e.g., adoption, accuracy. Ability to safeguard system quality and the ability to assess and communicate IAM and IDM system value to all stakeholders.
Requisition Number
PT0703756S
Special Instructions to ApplicantsOffer of employment is contingent on satisfactory completion of the University’s verification of credentials and other information required by law and/or…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).