×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Senior Analyst Identity Governance & Administration; IGA

Job in Raleigh, Wake County, North Carolina, 27601, USA
Listing for: Truist Financial
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Data Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Senior Analyst Identity Governance & Administration (IGA)

Cybersecurity Senior Analyst Identity Governance & Administration (IGA)

Company: Truist Financial
Location: Raleigh, NC
Employment Type: Full Time
Date Posted: 02/12/2026
Job Categories: Banking, Finance/Economics, Information Technology

Job Description Please review the following job description:

The Cybersecurity Senior Analyst IGA is responsible for leading the onboarding of applications into the organizations Identity Governance & Administration (IGA) platform. This role ensures applications are integrated with standardized access controls, federation, MFA, and Separation of Duties (SoD) policies. The analyst serves as a subject matter expert in identity lifecycle management, access certification, and governance processes, collaborating with application owners, security architects, and engineering teams to ensure secure, compliant access across the enterprise.

This position requires onsite presence five days per week, with Raleigh, NC designated as the preferred location. Charlotte/Wilson/Greensboro, NC and Atlanta, GA will also be considered.

For this opportunity, Truist will not sponsor an applicant for work visa status or employment authorization, nor will we offer any immigration‑related support for this position (including, but not limited to H-1B, F-1 OPT, F-1 STEM OPT, F-1 CPT, J-1, TN-1 or TN-2, E-3, O-1, or future sponsorship for U.S. lawful permanent residence status).

Essential Duties and Responsibilities Application Onboarding & Integration
  • Lead the end‑to‑end onboarding of applications into the enterprise IGA platform (e.g., SailPoint, Saviynt, Omada).
  • Conduct intake assessments to determine integration requirements such as access models, connectors, roles, and entitlements.
  • Collaborate with application owners to define access workflows, provisioning methods (API, SCIM, JDBC, AD groups, etc.), and approval paths.
  • Develop and maintain integration documentation and technical specifications.
Federation & MFA Enablement
  • Work with IAM engineering teams to establish federation using SAML, OAuth, OIDC, or WSFed.
  • Ensure the correct MFA policies are applied based on application sensitivity, user type, and organizational standards.
  • Validate that authentication flows follow Zero Trust principles and align with enterprise identity architecture.
  • Troubleshoot authentication, token, and SSO issues during onboarding or post‑deployment.
Separation of Duties (SoD) & Policy Enforcement
  • Implement and enforce SoD controls by aligning application entitlements to governance policies.
  • Conduct detailed SoD risk analysis for new applications to identify conflicts and propose remediation.
  • Collaborate with internal audit and compliance to maintain SoD rule sets and support audit findings.
  • Ensure access roles and entitlements are structured to prevent toxic combinations of privileges.
Identity Lifecycle & Governance Support
  • Design access models such as role‑based access control (RBAC), attribute‑based access control (ABAC), and birthright provisioning.
  • Support recertification campaigns by ensuring application entitlements are properly defined and mapped in the IGA platform.
  • Assist in maintaining identity data quality, entitlement hygiene, and governance standards.
  • Monitor the health, performance, and accuracy of application connectors.
Security, Compliance & Risk Management
  • Ensure onboarded applications meet enterprise security baselines, MFA requirements, and identity governance policies.
  • Support compliance initiatives such as SOX, PCI, HIPAA, or internal audit reviews.
  • Contribute to risk assessments for new and existing application integrations.
  • Document and remediate gaps in access controls, authentication flows, or identity governance processes.
Collaboration & Leadership
  • Serve as a subject matter expert for application teams, guiding them through onboarding and policy requirements.
  • Partner with security architecture, IAM engineering, and IT teams to design secure, scalable access patterns.
  • Mentor junior analysts on IGA processes, access modeling, and troubleshooting techniques.
  • Communicate complex identity concepts to business stakeholders in clear, non‑technical language.
Qualifications

Required Qualifications
  • Bachelor's degree or an…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary