×
Register Here to Apply for Jobs or Post Jobs. X

IAM Analyst

Job in Northbrook, Cook County, Illinois, 60065, USA
Listing for: Skill
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 54 - 60 USD Hourly USD 54.00 60.00 HOUR
Job Description & How to Apply Below

Overview

Placement Type:

Temporary

Salary:

$54-60 Hourly

Start Date:

Feb 16, 2026

Aquent is partnering with a leading organization at the forefront of its industry, dedicated to innovation and excellence. This is an incredible opportunity to join a team that values security, integrity, and forward‑thinking solutions. You will play a pivotal role in safeguarding critical digital assets, directly impacting the company’s resilience and success in an increasingly complex digital landscape.

Are you a passionate cybersecurity professional with a knack for identity and access management? We are seeking a highly skilled individual to champion robust IAM strategies and solutions. In this role, you will be instrumental in ensuring that our client’s digital environment is secure, compliant, and efficient, working closely with various teams to implement cutting‑edge security measures and protect sensitive information.

Get ready to make a significant impact by strengthening our client’s security posture and contributing to their ongoing success!

What You’ll Do
  • Serve as a subject matter expert on identity solutions, including IAM applications, platforms, frameworks, tools, directory services, privileged account management, synchronization, provisioning, and public key infrastructure.
  • Contribute to the development, enforcement, and remediation of policies, standards, and procedures related to identity and access management.
  • Actively participate in audits, conduct walkthroughs of access management processes, and drive enhancements to address any control deficiencies.
  • Ensure strict compliance with corporate policies, ethical practices, and all relevant regulatory guidelines.
  • Develop and articulate a clear understanding of the organization’s IAM strategy to various stakeholders.
  • Create meaningful IAM metrics and Key Performance Indicators (KPIs), presenting concise reports to upper management to track progress and measure success.
  • Evaluate various IAM tools and technologies, providing expert recommendations for solutions that align with business needs.
  • Lead comprehensive IAM projects from initiation to completion, including developing detailed project plans, coordinating resources, and managing timelines effectively.
  • Apply a strong understanding of security concepts to all aspects of IAM implementation and management.
  • Manage day‑to‑day operational activities, ensuring timely and effective resolution of escalations.
  • Administer user accounts, user groups, and access privileges within the organization’s identity management system.
  • Collaborate seamlessly with team members to integrate IAM solutions into the overall infrastructure.
Must‑Have Qualifications
  • Bachelor’s degree in Computer Science, Information Security, or a related field.
  • 6+ years of dedicated experience in Identity and Access Management.
  • In‑depth knowledge of IAM concepts, technologies, and frameworks.
  • Proven experience with industry‑leading Access Management tools.
  • Expertise in identity and access management methodologies, principles, and best practices.
  • Proficiency in leading incident response efforts for IAM security incidents and troubleshooting related issues.
  • Skilled in establishing IAM governance processes and policies to ensure compliance and best practices.
  • Ability to define and track KPIs for IAM activities, generating and presenting reports to senior management.
  • Competence in identifying IAM‑related risks and implementing effective mitigation strategies.
  • Knowledge in implementing strong authentication mechanisms, including multi‑factor authentication (MFA).
  • Demonstrated ability to design and manage end‑to‑end identity lifecycle processes (provisioning, deprovisioning, access reviews).
  • Proficiency in designing and enforcing access control mechanisms, role‑based access control (RBAC), and entitlement management.
  • Proficiency in designing and implementing privileged access management solutions.
  • Ability to translate complex security‑related matters into clear, understandable business terms for executives.
  • Capacity to navigate demanding, high‑pressure environments and deliver results under tight deadlines.
  • Strategic thinking with the ability to incorporate business needs into…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary