Identity & Access Management Specialists
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Information Security
Identity & Access Management Specialists
Be among the first 25 applicants.
Job Details- Open Date: 11/13/2025
- Close Date: 02/13/2026
- Location: Salt Lake City, UT (Campus)
- Work Schedule: Full-time, 40 hours per week;
Monday – Friday, 8:00 am to 5:00 pm - Hybrid Arrangement: Minimum three days per week in the Salt Lake Campus office; remaining days may be performed remotely
- Shift: Day
- Job Title: Identity & Access Management Specialists
- VP Area: U of U Health - Academics
- Department: 02228 - Data Coordinating Center
- Pay Rate Range: $32,248 to $69,585
- Type of Recruitment: External Posting
The Utah Data Coordinating Center (DCC) is seeking an Identity & Access Management Specialist to help lead identity and access management (IAM) efforts across the DCC’s research infrastructure, with a strong emphasis on a national-level data repository. Reporting to the IT Director, this role is responsible for designing, implementing, and maintaining IAM policies and controls that protect sensitive clinical research systems and data.
The specialist will manage account lifecycle workflows, monitor access logs, and ensure alignment with federal cybersecurity frameworks such as NIST SP 800-53. In addition to technical responsibilities, this position will support audit readiness, provide training on secure access practices, and contribute to maturing the DCC’s overall security posture.
Install, integrate, configure, and deploy identity and access management (IAM) solutions and systems to facilitate user life‑cycle management, identity and access governance, automated provisioning, and privileged account management.
Analyze, design, and support a continuous monitoring solution to verify user identities, validate appropriate user privileges, and appropriately grant resource access rights to users.
Contribute to the overall strategy, planning, and implementation of the Identity & Access Management program.
Partner with business and IT teams to provide technical oversight of key programs and controls necessary to ensure the protection of data and information assets.
Oversee daily operational activities for queue management of access requests, including prioritization, escalation, and processing.
Resolve user requests and incidents, and support end‑user communication on training regarding access management.
Create process workflows for key IAM initiatives.
Essential Functions Identity and Access Management Operations- Administer the full lifecycle of user accounts, including creation, modification, deactivation, and permission assignment.
- Implement and maintain IAM policies, roles, and access groups aligned with least‑privilege and separation‑of‑duties principles.
- Configure and support multi‑factor authentication (MFA) across systems and user groups.
- Monitor and audit access logs to detect anomalies or unauthorized access attempts.
- Conduct routine access reviews and role recertification campaigns.
- Support internal and external audits by maintaining documentation and evidence of access controls.
- Ensure IAM practices align with federal security frameworks such as NIST SP 800-53 and institutional policies.
- Conduct IAM‑related risk assessments to identify and remediate access control vulnerabilities.
- Participate in incident response efforts related to identity misuse or authentication failures.
- Assist in enforcing data access standards for national or federated systems.
- Collaborate with IT, HR, research, and data management teams to implement IAM workflows that balance usability and security.
- Provide training and onboarding for end users and staff related to secure access practices and IAM policies.
- Contribute to IAM documentation and process guides for internal use and compliance.
- Stay current with trends in IAM technologies, authentication protocols, and cloud‑based access solutions.
- Evaluate and recommend tools to improve IAM scalability, automation, and monitoring capabilities.
EQUIVALENCY STATEMENT: 1 year of higher education can be substituted for 1 year of directly related work experience…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).