User Access Security Administration Analyst
Role details
Job location
Tech stack
Job description
We have been retained by our client in the northwest area of Houston, Texas area to deliver a User Access Security Administration Analyst on a contract or contract-to-hire basis, working onsite M-F daytime. This opportunity offers advancement in a security career, working in a large corporate setting in business casual attire with an excellent company culture that develops talent for the long-term.
The User Access Security Administration Analyst will manage and support access control and identity management for various applications and platforms. This role will involve administering user access, ensuring compliance with security policies and automating access control processes to keep the environment secure. The IT Access Analyst will collaborate with internal teams to endure proper access rights for users, streamline access requests, and assist with compliance., * Provisioning and de-provisioning user access in Active Directory.
- Manage Microsoft Exchange distribution lists, mailboxes, conference rooms as well as calendars.
- Manages changes to NTFS folder structures across the corporation.
- Enforce and monitor Active Directory ( AD ) password policies (complexity, expiration, reset procedures).
- Work within the IT department to identify areas of improvement for security in applications and file systems.
- Generate reports on user access, permissions, and group memberships to support audit and compliance processes.
- Review and monitor logging systems.
- Assist with the documentation of policies, processes, standards, and guidelines.
- Solid troubleshooting skills for resolving access issues.
Requirements
- Experience in a dedicated information security role is required.
- Involvement with network equipment (routers, switches, and firewalls), server hardware, and/or Windows operating systems is required.
- Expertise with Active Directory user management, group policies, and security configurations.
- Hands-on experience with Microsoft Teams and Sharepoint security and access management recommended.
- Thorough understanding of NTFS and ACL s. - NTFS Access Control Lists (ACLs) are security mechanisms within Windows that define which users or groups can access specific files and folders, and what actions they can perform.
- Familiarity with Sailpoint identity governance solutions, particularly for user provisioning.
- Expertise in Azure and all cloud app security is recommended.
- Strong verbal and written communication skills are required.
- Active member of one or more security associations (ISSA, ISACA, ISC2, etc.) is recommended., c.) ISC2 (International Information System Security Certification Consortium) is a leading non-profit organization specializing in cybersecurity training. They offer vendor-neutral certifications, including the prestigious CISSP, designed to validate skills in cybersecurity, privacy, and IT security.
- High School diploma or equivalent is required. Bachelor's degree is preferred.
- 3+ years experience in IT security in the following area preferred:
- The following certifications are preferred:
- CISSP (Certified Information Systems Security Professional)
- Security+ - CompTIA Security+ (Plus) Certification
- CAMS - Certified Anti-Money Laundering (AML) Specialist (CAMS)
- CIAM - (Customer Identity and Access Management) and IAM (Identity and Access Management) differ primarily by target audience: CIAM serves external customers, focusing on seamless user experience (UX) and massive scaling. IAM manages internal employees
- CIGE - Certified Identity Governance Expert (CIGE), a professional certification from the Identity Management Institute (IMI) focusing on digital identity management, access governance, and security compliance