User Access Security Administration Analyst

Computer Staff, Inc.
Houston, United States of America
6 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate
Compensation
$ 100K

Job location

Houston, United States of America

Tech stack

Microsoft Windows
Access Control List
Microsoft Active Directory
Azure
CompTIA Security+
Computer Security
File Systems
Microsoft Exchange Server
Identity and Access Management
Information Security Management
Networking Hardware
Information Systems Security Architecture Professional
NT File System (NTFS)
SharePoint
User Provisioning Software
Network Routers
Firewalls (Computer Science)
Customer Identity Access Management
Hardware Infrastructure
SailPoint
User Administration

Job description

We have been retained by our client in the northwest area of Houston, Texas area to deliver a User Access Security Administration Analyst on a contract or contract-to-hire basis, working onsite M-F daytime. This opportunity offers advancement in a security career, working in a large corporate setting in business casual attire with an excellent company culture that develops talent for the long-term.

The User Access Security Administration Analyst will manage and support access control and identity management for various applications and platforms. This role will involve administering user access, ensuring compliance with security policies and automating access control processes to keep the environment secure. The IT Access Analyst will collaborate with internal teams to endure proper access rights for users, streamline access requests, and assist with compliance., * Provisioning and de-provisioning user access in Active Directory.

  • Manage Microsoft Exchange distribution lists, mailboxes, conference rooms as well as calendars.
  • Manages changes to NTFS folder structures across the corporation.
  • Enforce and monitor Active Directory ( AD ) password policies (complexity, expiration, reset procedures).
  • Work within the IT department to identify areas of improvement for security in applications and file systems.
  • Generate reports on user access, permissions, and group memberships to support audit and compliance processes.
  • Review and monitor logging systems.
  • Assist with the documentation of policies, processes, standards, and guidelines.
  • Solid troubleshooting skills for resolving access issues.

Requirements

  • Experience in a dedicated information security role is required.
  • Involvement with network equipment (routers, switches, and firewalls), server hardware, and/or Windows operating systems is required.
  • Expertise with Active Directory user management, group policies, and security configurations.
  • Hands-on experience with Microsoft Teams and Sharepoint security and access management recommended.
  • Thorough understanding of NTFS and ACL s. - NTFS Access Control Lists (ACLs) are security mechanisms within Windows that define which users or groups can access specific files and folders, and what actions they can perform.
  • Familiarity with Sailpoint identity governance solutions, particularly for user provisioning.
  • Expertise in Azure and all cloud app security is recommended.
  • Strong verbal and written communication skills are required.
  • Active member of one or more security associations (ISSA, ISACA, ISC2, etc.) is recommended., c.) ISC2 (International Information System Security Certification Consortium) is a leading non-profit organization specializing in cybersecurity training. They offer vendor-neutral certifications, including the prestigious CISSP, designed to validate skills in cybersecurity, privacy, and IT security.
  • High School diploma or equivalent is required. Bachelor's degree is preferred.
  • 3+ years experience in IT security in the following area preferred:
  • The following certifications are preferred:
  • CISSP (Certified Information Systems Security Professional)
  • Security+ - CompTIA Security+ (Plus) Certification
  • CAMS - Certified Anti-Money Laundering (AML) Specialist (CAMS)
  • CIAM - (Customer Identity and Access Management) and IAM (Identity and Access Management) differ primarily by target audience: CIAM serves external customers, focusing on seamless user experience (UX) and massive scaling. IAM manages internal employees
  • CIGE - Certified Identity Governance Expert (CIGE), a professional certification from the Identity Management Institute (IMI) focusing on digital identity management, access governance, and security compliance

About the company

b.) ISACA is a global, non-profit professional association (formerly the Information Systems Audit and Control Association) that provides IT professionals with knowledge, certifications, community, and education in cybersecurity, IT governance, risk management, and assurance.

Apply for this position