×
Register Here to Apply for Jobs or Post Jobs. X

Sr. Analyst, Information Security

Job in Wilmington, Middlesex County, Massachusetts, 01887, USA
Listing for: Analog Devices
Full Time position
Listed on 2025-12-19
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant, Data Security, Information Security
Job Description & How to Apply Below
Position: Sr. Staff Analyst, Information Security

Sr. Staff Analyst, Information Security About Analog Devices

Analog Devices, Inc. (NASDAQ: ADI) is a global semiconductor leader bridging the physical and digital worlds to enable breakthroughs at the Intelligent Edge. With revenue exceeding $9 billion in FY24 and over 24,000 employees worldwide, ADI delivers solutions that advance digitized factories, mobility, digital health, combat climate change, and reliably connect people and the world.

Position Summary

This position is part of the Cyber Security team, requiring a strong background in cybersecurity and foundational identity management technology and architecture. The Sr. Staff Analyst – Identity Governance will lead and support Identity Governance initiatives, including IGA platform implementation, PAM, RBAC/SOD enforcement, MFA optimization, and ZTNA maturity.

Key Responsibilities
  • Identity Governance
    • Design, implement, and manage IGA controls and platforms to support user provisioning, deprovisioning, access requests, and UARs.
    • Implement automation for these processes, streamline end‑user experience, utilizing AI for efficiency.
    • Design, manage, and mature RBAC to enforce least privilege and limit access to necessary resources.
    • Develop and maintain documentation on SOPs, configurations, and technical settings for IGA technologies.
    • Investigate and respond to identity‑related incidents, violations, and anomalous access behavior.
    • Monitor data access activity, identify risks, and maintain audit trails.
    • Collaborate with IT, HR, and business partners to refine identity lifecycle processes and establish entitlement structures.
    • Align Identity Governance with regulatory requirements (SOX, CMMC, TISAX, HIPAA).
    • Remediate orphan accounts, access violations, and SoD conflicts.
    • Provide Tier 3 support for cyber identity incidents.
    • Automate workflows using Power Shell, Python, or similar scripting languages.
    • Participate in ongoing auditing and risk assessments.
  • UARS – User Access Certifications
    • Manage UAR process for the enterprise‑supported access program, planning quarterly reviews.
    • Document and archive evidence of authorization.
    • Engage system partners to ensure readiness for regular UARs.
    • Produce reporting, dashboards, and scorecards to support UAR health.
  • IT IAM Team Collaboration & Foundational IAM Architecture Support
    • Assist IT partners in designing IAM solutions, SSO, and MFA across the organization.
  • Collaborate with Security, IT, and network teams to mature ZTNA capabilities based on continuous access evaluation.
  • Assist IT IAM Engineers in architecting solutions that adhere to ADI’s cybersecurity policies.
  • Support troubleshooting of IAM tools and processes.
  • Work across IT and cybersecurity infrastructure to define, document, and test security solution architecture.
  • Collaborate with IAM leads and business managers to design solutions aligned with enterprise policy.
  • Privilege Access Management
    • Support Delinea PAM platform architecture and configuration, including migration to SAAS.
    • Ensure privileged roles comply with ADI’s policy and regulatory obligations.
    • Refine technical PAM solutions aligned with enterprise architecture and business use cases.
    • Document SOPs and system configurations for internal team use.
  • Stay current with emerging IAM, PAM, and IGA technologies and regulatory changes.
Required Qualifications
  • Bachelor’s degree in Cybersecurity, Computer Science, or related field.
  • Minimum 7‑9 years of experience (10+ preferred) in IT, IAM, or Cyber Security.
  • 5+ years of experience with industry IGA solutions (SailPoint, Saviynt).
  • Expert knowledge of PAM and IAM Governance principles.
  • Extensive knowledge of Active Directory, Microsoft Entra, LDAP, Redhat Identity, SSO, and troubleshooting.
  • Hands‑on experience with IGA tools and PAM solutions (including Delinea).
  • Strong understanding of identity lifecycle, RBAC, policy‑based access controls.
  • Proficiency in scripting and automation (Power Shell, Python).
  • Excellent problem‑solving and communication skills.
  • Knowledge of security frameworks (NIST, ISO 27001) and compliance requirements (SOX, CMMC, PCI, etc.).
  • Experience with audits and compliance in regulated environments.
Preferred Qualifications
  • Relevant certifications: CISSP, CISM,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary