Identity & Access Management; IAM Analyst
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Information Security
Identity & Access Management (IAM) Analyst
Join to apply for the Identity & Access Management (IAM) Analyst role at Inside Higher Ed
Department SummaryThe UCLA Information Security Office enables UCLA’s goals by providing leadership assuring the confidentiality, integrity, and availability of its information resources. The Information Security Office enables efficient incident response planning and notification procedures. In addition, the office aims to implement risk assessment strategies to identify vulnerabilities and threats to departmental information resources and enterprise systems. This includes executing a comprehensive UCLA IT security plan, which involves proposing, delivering, and enforcing administrative, technical, and physical security measures to tackle identified risks based on their sensitivity or criticality.
Identity and Access Management protects UCLA’s resources and supports university business through access management, including account lifecycle, authentication, access, and role-based provisioning at the enterprise level. This team implements rigorous regulation of entitlements through granular access control and the auditing of all identities managed by UCLA.
The Identity & Access Management (IAM) Analyst will be responsible for leading the design, implementation, and support of advanced identity and access management data, processes, and technologies. This role will work closely with various departments across the university, as well as external vendors, to ensure quality of identity data, the establishment of data standards, and the appropriate access levels are granted to users in a timely, secure, and compliant manner, focusing on automation wherever possible.
In addition, the position will evaluate and test new software and upgrades. The IAM Analyst will help produce documentation, procedures, and any necessary materials to support IAM services. The IAM Analyst will positively impact UCLA's operations and culture by protecting University stakeholder's information and data in service of the institution's academic and research mission. This team member will advance the University's mission by delivering exceptional IAM service comprehensively and consistently across faculty, staff, students, and persons of interest.
This role will execute UCLA's vision while modeling UCLA's culture and values.
- UCLA provides a full pay range. Actual salary offers consider factors, including budget, prior experience, skills, knowledge, abilities, education, licensure and certifications, and other business considerations. Salary offers at the top of the range are not common. Visit UC Benefit package to discover benefits that start on day one, and UC Total Compensation Estimator to calculate the total compensation value with benefits.
- Three years Experience working in one or more of the following fields: computer science, cybersecurity, computer information systems, or related field. (Required)
- Experience using identity and access tools and systems in a distributed IT environment. (Required)
- Experience with IAM monitoring tools. Experience analyzing logs for anomalous user behavior. (Required)
- Experience participating in activities to advance an inclusive environment that values equity, diversity, inclusion and belonging. (Required)
- Five or more years Experience working in one or more of the following fields: computer science, cybersecurity, computer information systems, etc. (Preferred)
- Experience in complex higher education environments, serving academic and administrative functions of a large public university. (Preferred)
- Demonstrated skills applying secure user authentication and account management standards to computer software and hardware. (Required)
- Strong knowledge of IAM principles, technologies, and best practices, including experience with role-based access control (RBAC) and access governance (IGA), and privileged access management (PAM). (Required)
- Familiarity with directory services (e.g., Active Directory, LDAP), authentication (e.g., Single Sign-On (SSO)) technologies, and multi-factor authentication (MFA) solutions.…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).