×
Register Here to Apply for Jobs or Post Jobs. X

Identity and Access Management; IAM Analyst

Job in Conroe, Montgomery County, Texas, 77303, USA
Listing for: Independent Health
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Identity and Access Management (IAM) Analyst

FIND YOUR FUTURE

Overview

The Identity and Access Management (IAM) Analyst will be responsible for developing, maintaining, and implementing the enterprise information security approach to logical access, identity and access management (IAM), privileged identity management (PIM), and access controls. This associate will also be responsible for maturing the existing IAM program including the tools (SailPoint Identity Now) and process flows. This team member will also monitor, review, and audit user activities and ensure access is maintained to the minimum necessary level.

They will provide assurance of security related components of IT operations including administrator activity reviews, investigation, and response to internal and external audit inquiries. They will work with IAM leads, IT, and business managers to understand requirements, enterprise IT standards, and other considerations that influence how IAM solutions and services should perform and operate. The Analyst will execute and mature key components of these processes, as well as assist in the execution of the enterprise-wide information security awareness program, maintenance of security policies, and monitoring of compliance with these policies.

Qualifications
  • High school diploma or GED required. Bachelor’s degree preferred.
  • Five (5) years of IT experience encompassing project management, information security, risk management and/or programming required. Working experience in one or more areas of information security required including: identity and access management, role-based access control (RBAC) methodologies, privileged identity/access management, access reviews, IT audit, segregation of duties and federation protocols (OAuth, SAML, OpenID), or Single Sign On (SSO) models.
  • Industry recognized certification within the domain of information security, information technology and privacy (e.g., CISSP, GIAC, CISM, ITIL, CIPP/US, etc.) preferred.
  • Experience with SailPoint Identity Now or equivalent identity and access management software solutions preferred.
  • Knowledge of or experience in Microsoft Office tools, Active Directory, AS400, Linux/Unix, API, Cyber Ark, and Azure Dev Ops.
  • Experience making independent risk-based decisions for planning and incident management, with consideration for business and operational goals and constraints.
  • Excellent planning and problem-solving skills; must have high attention to detail and quality of work deliverables. Strong organization skills with the ability to handle multiple priorities.
  • Excellent oral and written communication skills, as well as the ability to convey security, technical and privacy related issues to business audience.
  • Ability to work with a team as well as diverse work groups on prevention, identification, and resolution of privacy and security problems.
  • Knowledge of information security fundamentals, information security policies and procedures, industry best practices as well as various governance standards and healthcare law (HITRUST, NIST, ITIL, HIPAA, HITECH, etc.).
  • Proven examples of displaying the IH values:
    Passionate, Caring, Respectful, Trustworthy, Collaborative and Accountable.
Essential Accountabilities
  • Develop, deploy, and maintain role-based logical access processes. Guide all components of the enterprise approach to critical security functions such as: identity and access management (IAM), privileged identity management, and access controls.
  • Develop, implement and maintain logical access roles within the SailPoint Identity Now platform to ensure access is provisioned/deprovisioned at the appropriate times to ensure compliance with corporate policies.
  • Manage the oversight and maturation of efficiencies in the security functions ensuring adherence to company policy and standards.
  • Provide governance within the information risk office team and others with regard to the access management and privileged identity management arenas.
  • Develop, foster, and mature process efficiencies with the goal of reducing time and effort to perform.
  • Maintain security policies including updates to reflect changing practices and business needs. Monitor compliance with policies.
  • Monitor and audit user…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary