Senior Identity & Access Management Analyst - IS-Security (1.0 FTE, Days)
1.0 FTE, 8 Hour Day Shift
At Stanford Children’s Health, we know world-renowned care begins with world-class caring. That's why we combine advanced technologies and breakthrough discoveries with family-centered care. It's why we provide our caregivers with continuing education and state-of-the-art facilities, like the newly remodeled Lucile Packard Children's Hospital Stanford. And it's why we need caring, committed people on our team - like you. Join us on our mission to heal humanity, one child and family at a time.
This paragraph summarizes the general nature, level and purpose of the job.
The Senior Identity & Access Management Analyst will support service line initiatives within the Identity and Access Management (IAM) team in support of broader company initiatives. All team members have the primary responsibility of processing user access requests, ensuring integrity/accuracy of identity data, and requiring access to be removed when individuals leave Stanford Children's Health or change job functions through the use of Identity Manager Software. In addition, the Sr. IAM analyst will provide identity program support, analysis and development knowledge for identity governance, privileged access management, single sign-on, multifactor authentication advisory, access recertification, and role definition and maintenance.
The essential functions listed are typical examples of work performed by positions in this job classification. They are not designed to contain or be interpreted as a comprehensive inventory of all duties, tasks, and responsibilities. Employees may also perform other duties as assigned.
Employees must abide by all Joint Commission Requirements including but not limited to sensitivity to cultural diversity, patient care, patient rights and ethical treatment, safety and security of physical environments, emergency management, teamwork, respect for others, participation in ongoing education and training, communication and adherence to safety and quality programs, sustaining compliance with National Patient Safety Goals, and licensure and health screenings.
Must perform all duties and responsibilities in accordance with the Service Standards of the Hospital(s).
With limited supervision:
Processes access requests according to standard operating procedures and service level commitments.
Monitors access, user provisioning inside the applications, equipment, and prepare reports related to access control and criteria.
Performs proactive segregation-of-duty analysis to ensure end users are not given excessive access to unauthorized IT assets.
Collaborates in the development and execution of policies and procedures to ensure information systems reliability and accessibility.
Prevents and defends against unauthorized access to systems, networks, and data.
Assists in the design and improvement of access administration processes
Creates and maintains up-to-date provisioning processes including on-boarding, off-boarding, role management, attestation, report generation and compliance processes.
Monitors and audits user access by gathering information from system administrators in systems outside the Identity Management Solution
Works closely with team leads, peers, development teams, business analysts, and end users to ensure Stanford Children's Health systems have appropriate access controls and protections
Participates in new projects to perform detailed access, authorization, and authentication analysis for applications and systems to ensure appropriate controls are selected and operationalized
Represents the IAM team in working with stakeholders to identify and document requirements needed for system and application integration with all IAM standards and technologies.
Participates and/or lead the execution of aligning applications and systems to Stanford Children's Health IAM governance framework.
Delivers process improvements utilizing IAM tools and products.
Participates in operations and tactical incident response as a member of the Information Security team.
Contributes to the development of new programming/analysis concepts and improvement of existing techniques.
Meets with customer peers and vendors regularly to define and resolve product or project problems and issues.
Analyzes business requirements, develops and evaluates alternatives, prepares approaches for complex programming systems or application operating environments.
Contributes to development of Information Security strategy and architecture.
Provides technical advice to management, recommending approaches and solutions to complex problems
Participates as the key technical advisor in project(s) and team(s) development activities.
Estimates resources for initiatives; translating major client requirements into installation modifications; developing plans, schedules for major installation projects; all of which requires a very high degree of innovation and creativity.
Analyzes objectives, solves problems, and develops requirements and proposals for programming systems. These activities require sophisticated business and technical expertise, extensive programming and systems knowledge, and considerable innovative ability.
Serve as an escalation of IAM services
Any combination of education and experience that would likely provide the required knowledge, skills and abilities as well as possession of any required licenses or certifications is qualifying.
Education: Bachelor's Degree in Computer Science or closely related field.
Experience: Four (4) years of progressively responsible directly related work experience.
Knowledge, Skills, and Abilities
These are the observable and measurable attributes and skills required to perform successfully the essential functions of the job and are generally demonstrated through qualifying experience, education, or licensure/certification.
Knowledge of Identity Access Management (IAM) program structure and elements to include but not limited to: Provisioning and Access termination, application onboarding, single sign on, Identity Federation, privileged access management, multi-factor authentication, role-based access, Self-service user enablement, password management.
Knowledge of general Information Security concepts, policies, and procedures.
Knowledge of Identity Management tools and software.
Knowledge Microsoft Windows, Mac and Mobile device (iOS, Android, Windows Mobile, etc.) terminology and technology capabilities with respect to access, authentication, and authorization.
Ability to organize and manage multiple priorities
Ability to actively listen: giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times
Ability to create business documentation
Ability and knowledge to utilize inherent functionality in the Microsoft Office tools for data analysis, documentation, and presentations.
Keeps technically current with changes and improvements within area of assignment or specialization, incorporating them where applicable.
The Physical Requirements and Working Conditions in which the job is typically performed are available from the Occupational Health Department. Reasonable accommodations will be made to enable individuals with disabilities to perform the essential functions of the job.
Equal Opportunity Employer