Identity & Access Management Security Analyst II
Listed on 2026-03-15
-
IT/Tech
Cybersecurity, IT Consultant
Overview
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company — not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we’re excited about what’s next. Join us.
General
Summary:
Unum is looking for an experienced IAM Security Analyst II to join our growing security team. In this role, you ll own the full lifecycle of user access — from IAM provisioning and access reviews to audit support and remediation — while partnering closely with engineers, auditors, and cross-functional teams across the enterprise to ensure secure, compliant access management. You ll play a key role in building and executing enterprise security programs, maintaining strong relationships with both internal and external audit partners.
That includes helping engineer security solutions that protect Unum s information assets, while delivering critical IAM capabilities to our customers — spanning privileged account management across all platforms, access provisioning, and secure authentication protocols.
Job Specifications
- Bachelors or advanced degree in computer science, or comparable work experience
- Has 4+ years of related work experience in information technology engineering, support or consulting. It’s preferred if two of those years were spent in networking, application development, system security or IT audit related positions
- Demonstrates success in:
- Working effectively in an ambiguous environment and across geographical locations, and functioning independently
- Detecting and analyzing hostile and other improper actions in such an environment
- Investigating and responding to security alerts, or new security threats with a sense of urgency
- Delivers effective, high-quality solutions in a timely manner while balancing shifting priorities and, at times, accelerated timelines
- Facilitates matching business needs and services options by leveraging knowledge of business strategy, processes, and market offerings to assist in evaluating the most appropriate products and services to meet requirements
- Maintains close relationships with the business to understand strategy, processes, plans, and needs to help influence planning by advising on best practices, innovative technology, and enablement opportunities
- Communicates effectively with business partners, customers, brokers, third party suppliers/partners, and systems resources at all levels
- Demonstrates strong analytical and problem-solving skills and proactive thinking skills
- Has strong oral and written communications skills
Technical Skills for Identity & Access Management
- Experience in supporting global identity and access management solutions (Identity Management, Access Management, Virtual Directory, SSO)
- Experience on SailPoint and/or other Identity management systems
- Experience on SSO (Single-Sign-On) technologies including Cloud, SAML and federation of identities (IdP initiated and SP initiated), multi-factor authentication
- Experience on Cyber Ark, Enterprise Certificate Management and Enterprise Token Services technologies
- Experience with LDAP/Directory Services including Active Directory
- Experience with RACF, DB2, SQL
- Experience with Azure, O365 and AWS
- Familiar with regulations, including, GLBA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs
- ISO 27001/27002, the NIST Cyber Security Framework
- CI…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).