Cybersecurity IAM Specialist
Listed on 2025-12-15
-
IT/Tech
Cybersecurity, IT Consultant
Join the Clean Energy Revolution
Become a Cybersecurity IAM Specialist at Southern California Edison (SCE) and build a better tomorrow. In this job, you’ll develop plans to implement highly available privileged access management solutions, and troubleshoot and remediate issues related to privileged accounts, secrets management, and integrations. You will build upon your experience and develop engineering skills involving secure solutions using a suite of tools across our enterprise portfolio.
You’ll serve as a trusted partner to our Risk Management, Automation, and Vulnerability Management teams. If you’re passionate about securing identities and enabling seamless access, we’d love to have you on our team!
In this role you will: Engineer new solutions and configure integrations between existing systems, apply strong troubleshooting skills to solve complex problems at enterprise scale, and write and quickly digest technical architecture and engineering documentation. You will bring your strong documentation habits, and contribute to architecture diagrams and SOPs. To ensure compliance and security policy alignment with industry standards and best practices, you’ll also work with partner teams to plan upgrades and make formal process improvement recommendations.
Bring your expertise in Identity and Access Management (IAM) to the next level! Familiarity with Identity and Access Management (IAM) standards, including Privileged Access Management, Secrets Management, OIDC, OAuth, SAML, SCIM, API gateways, and Active Directory Federation, is essential for success in this role. Hands‑on experience with leading tools from Cyber Ark, Okta, Microsoft, and SailPoint is a big plus.
As a Cybersecurity IAM Specialist
, your work will help power our planet, reduce carbon emissions and create cleaner air for everyone. Are you ready to take on the challenge to help us build the future?
- Investigates and responds to security alerts including on‑call rotation
- Supports the development, design, logistics, and facilitation of internal and external cybersecurity exercises
- Steers the analysis of network traffic and system data to identify anomalous activity and potential threats to resources
- Delivers cyber incident triage including identifying the specific vulnerability and making recommendations which enable expeditious remediation
- Conducts vulnerability research activities, gathers information on new and emerging threats and vulnerabilities
- Reports on and suggests solutions for damage to the data and infrastructure as a result of cyber incidents
- Supports the strategic development of Cyber Security Programs ensuring alignment with the cyber security strategy and develops and improves cyber security procedures owned by the team
- Manages cyber incident trend analysis and reporting
- Creates and maintains high quality documentation related to IT processes including flow charts and data flow diagrams
- Maintains the cybersecurity post‑incident after action tracking process
- A material job duty of all positions within the Company is ensuring the protection of all its physical, financial and cyber security assets, and properly accessing and managing private customer data, proprietary information, confidential medical records, and other types of highly sensitive information and data with the highest standards of conduct and integrity.
- Three or more years of experience in information technology, information security and/or cybersecurity.
- US Citizenship Required.
- Bachelor’s degree or higher in Computer Science, Information Technology, or related field.
- Two or more years of experience working with Identity and Access Management tools and platforms with proficiency in basic scripting.
- Familiarity with multiple Identity and Access Management standards and processes, including Privileged Access Management, Secrets Management, OIDC, OAuth, SAML, SCIM, API gateways, and Active Directory Federation.
- Experience collaborating in a team environment.
- Certifications from IT and Cybersecurity industry leaders.
- Experience with Incident Response and Cybersecurity Threat Intelligence functions.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).