We provide IT Staff Augmentation Services!

Identity & Access Management Analyst Resume

2.00/5 (Submit Your Rating)

Taylor, TX

PROFILE:

As an IAM Information Analyst I manage all the access to IT resources via the appropriate application of roles, security policies, authentication and authorization parameters, access filters, and approval workflows. Responsible for end - to-end IT account lifecycle management and consistent execution of identity and access management processes in accordance with Confidential . Manages the integrity and accuracy of identity data and individual credentials ensuring employees have the access required to perform job duties. Facilitates periodic access reviews and certifications for managers to attest that employees have the right access to resources. Provides overall technical support for the implementation and administration of the Identity and Access Management (IAM) and Privileged Account Management (PAM) processes and systems. Applies analytical processes for reviewing evidence, data, and reporting to ensure that IAM and PAM systems are functioning correctly in order to maintain compliance with federal regulatory requirements.

CORE COMPETENCIES:

  • Understanding of NERC CIP004 R4 and R5 and CIP007 R5
  • IDM
  • Generate reports NERC Audit
  • CyberArk
  • Advanced Troubleshooting / Diagnosis
  • Innovative Problem Solving Approach
  • Performance Monitoring / Reporting

TECHNICAL PROFICIENCIES:

Platforms: Windows XP-10,Linux

Software: Microsoft Office, SharePoint, SCCM, PowerShell, VPN, IDM, SQL, Active Directory, Remedy, CyberArk

Hardware / Equipment: Laptops, Desktops, Satellite Transceivers, Fiber Optic Cabling, OptiVisor 400 OTDR, Fluke Network OFTM 5612 & 5632, X-77 Fusion Splicer, Fujikura Arc Fusion Splicer FSM 50S, OTS 300-series Test Set, VFL, Unicam Kit, Anaerobic Kit, Heat Cure Kit, Cam Splice Kit, PCH 01U & 04U, WIC 02P & 04P

PROFESSIONAL EXPERIENCE:

Confidential, Taylor, TX

Identity & Access management analyst

Technical Scope: IDM(Sun Java System V7), Windows 7-10, Active Directory, Jira, Remedy, PowerShell

Responsibilities:

  • Manages and is responsible for all access to Confidential ’s IT resources via the appropriate application of roles, security policies, authentication and authorization parameters, access filters, and approval workflows.
  • Responsible for end-to-end IT account lifecycle management and consistent execution of Confidential identity and access management processes in accordance with Confidential .
  • Manages the integrity and accuracy of identity data and individual credentials ensuring employees have the access required to perform job duties.
  • Facilitates periodic access reviews and certifications for managers to attest that employees have the right access to resources.
  • Provides overall technical support for the implementation and administration of the Identity and Access Management (IAM) and Privileged Account Management (PAM) processes and systems. Applies analytical processes for reviewing evidence, data, and reporting to ensure that IAM and PAM systems are functioning correctly in order for Confidential to maintain compliance with federal regulatory requirements.
  • Understands and applies principles, theories and concepts related to the profession and Confidential 's culture.
  • Exercises judgment within defined procedures and practices to determine appropriate action.
  • Impact is generally limited to specific assignments or projects.
  • May respond to inquiries and/or provide assistance and/or guidance to lower level workers.
  • Provides support and analysis of preventive and detective controls to ensure integrity and quality of Identity and Access Management processes
  • Understand and anticipate analytical needs across the Identity and Access Management domain, autonomously plan and execute the efforts to address needs for daily operational effectiveness and compliance (e.g. ensuring all account lifecycle management data supports NERC CIP004 R4 and R5 and CIP007 R5)
  • Responsible to develop analysis and reporting capabilities as well as monitor performance and quality control plans to identify Identity and Access Management improvements
  • Performs full lifecycle analysis to include requirements, activities and design
  • Identifies and diagnoses data from detective controls, performs corrective actions to deliver services and compliance at expected levels
  • Develops, maintains and presents employee access metrics reflecting accurate performance of the Employee Access process
  • Directs management on finding of metadata deficiencies
  • Develops and implements data analysis, data collection systems and other strategies that optimize statistical efficiency and quality
  • Establishes strong working relationships with key staff members across the company
  • Supports the development, coordination delivery of improvements and updates to the Employee Access Process and its procedures
  • Analyzes and addresses employee access issues that may prevent delivery of established Service Level Agreements and corporate standards
  • Generates reports for internal, SOC, and NERC audits
  • Identifies and recommends alternatives to streamline data to support business process and requirements.
  • Uses data to create models that depict trends in SLA s, operational deficiencies and operational improvements

Confidential, Austin, TX

Desktop Technician

Technical Scope: Windows XP-7, Excel, Outlook, PowerShell

Responsibilities:

  • Reviews, analyzes, and evaluates systems and user needs.
  • Formulates systems to parallel overall business strategies.
  • Writes detailed description of user needs, program functions, and steps required to develop or modify computer programs.
  • Determines impact of known and anticipated business needs upon system configurations in use.
  • Researches, evaluates, designs, and proposes basic to moderately complex technology solutions to meet business needs cost - effectively and in accordance to standards.
  • Evaluates database design and configuration thresholds, including capacity and performance.
  • Recommends system improvements as needed to resolve instability issues and extend overall system life.
  • Evaluates and prescribes software routines and procedures to keep resource consumption (CPU cycles, disk read/write processes, network traffic) at a minimum.
  • Evaluates and prescribes operating efficiencies, including system availability, response time between selected components, data-error checking, and data discard rate.
  • Defines, develops and publishes standards and procedures for on-going operations, including automated services, naming conventions and directory structures, local and remote access, data storage and data back-up.
  • Provides technical guidance to project teams and department staff as needed to meet stated business objectives.
  • Exchanges information, verbally and in writing, clearly, accurately, reliably, and timely.
  • Responsible for design, development, implementation, and analysis of technical products and systems.

Confidential, Temple, TX

IT Technician / Customer Engineer

Technical Scope: Windows XP-7, Excel, Outlook, PowerShell

Responsibilities:

  • Provide technical support to diverse clients, ensuring alignment with statements of work, internal processes, and best practices.
  • Communicate with clients to ascertain needs and provide hands-on user training.
  • Expertly perform numerous Windows 7 upgrades; backup user profiles, configure OS, and reinstall software as necessary.
  • Quickly and effectively troubleshoot issues with installation and upgrade processes to provide timely diagnoses and resolution.

Confidential, Austin, TX

Customer Engineer

Technical Scope: Windows 7-8, Hardware Components

Responsibilities:

  • Disassembled PCs to remove faulty hardware and install replacement components; performed testing to verify functionality.
  • Ordered parts and coordinated appointments with clients.
  • Consistently maintained alignment with deadlines while ensuring high-quality results.

Confidential

Computer System Support Specialist

Technical Scope: Windows XP-7, Windows Server 2008, Oracle 11G, Microsoft Office, SharePoint, MS-SQL, Lotus Forms, Adobe Flash Player, Shockwave Player, Reader, DameWare, SolarWinds, McAfee VirusScan Enterprise, Symantec Endpoint Security, Tumbleweed Desktop Validator, ActivClient, DBsignWeb Signer, Sun Java JRE

Responsibilities:

  • Installed, configured, integrated, administered, tested, and maintained information and network systems, ensuring security, availability, and integrity.
  • Performed coding, testing, debugging, development, implementation, and maintenance for complex applications and forms.
  • Maintained records and prepared reports.
  • Liaised with senior managers, stakeholders, and end-users; responded to requests and troubleshot issues.
  • Continually researched emerging technologies and recommended hardware/software upgrades compatible with existing systems.
  • Prepared technical documentation. Participated in continuing education opportunities.
  • Spearheaded development and implementation of new applications and processes to streamline workflows and improve efficiency.

We'd love your feedback!