The Identity & Access Management team is responsible for how users within an organization are given an identity, and how it is protected, which includes securing critical applications, data, and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization.
Identity & Access Management involves protecting data assets and implementing processes, tools and standards to run business intelligently. The team is heavily involved in the Audit & Regulatory Compliance area.
The IAM Administrator II will be responsible for access management for state applications, systems and resources while ensuring compliance. This position is responsible for doing research and analysis for possible duplicate accounts. Responsible for going into the back end of the IAM Identity Manager system to perform daily tasks. Support development team with ticket backlog for accounts that need further verification, have incorrect data, and/or need to be transferred to different agencies. It is the responsibility of the IAM Administrator to manage identity and access across state systems by providing the right person, the right access at the right time.
Qualifications:
The Service Delivery Product Management unit is responsible for provisioning support which includes ticket management, customer service, and knowledge of least privilege methodology with security rights, permissions and groups, experience with Active Directory, CA Service Desk. Due to the importance of this position, it is expected that a person supporting IAM has great troubleshooting skills with networking and computer systems, can multitask, and work in a fast paced environment while providing excellent customer service.
- Experience on Identity and Access Management and the operation of identity and access processes and controls for Active Directory, Email and Collaboration Platforms and cloud based solutions.
- Preferred experience with One Identity products
- Previous experience with working in the back end of Identity Management systems
- Strong analytical skills/problem solving/conceptual thinking/process engineering
- Ability to be comfortable delivering messages across a wide spectrum of individuals having varying degrees of technical understanding
- Experience in Information Technology / Information Security / Identity and Access Management
Location Requirements
Candidate must be local.
Candidate Must Be Local
Additional Location Details (City, State) :
Colorado
Information Security Training
Information on Security Training
NOTICE: If you are hired as vendor staff who will have access to state systems or data or as a contractor for one of the state executive branch consolidated agencies, in adherence to Colorado Revised Statute § 24-37.5-401, 403, 404, 405, and 406, and Colorado Information Security Policy (CISP) 002, you will be required to self-register and complete information security training, including but not limited to review and acknowledgement of the Acceptable Use of State Data and IT Resource Policy (AUP) (CISP-018), through the consolidated agency contractor information security training site within 30 days of your contract start date and annually thereafter. Should you be awarded this contract, the state agency will provide the contractor information security training site information to you.
Background Verification
Minimum Verification Requirements
Please complete the following verifications with Info Cubic upon candidate's selection. Additional verifications may be identified by the agency. - State Criminal Record verification (past 7 years covering each State in which the candidate has resided)
- County Criminal Records (past 7 Year Address History)
- Federal Criminal Records Verification (past 7 years)
- SSN Name Search
- Global Monitor Check (formerly Patriot/OFAC/Terrorist)
(Suppliers Only)
To order, click on the link to the right:
Order the OIT Background Verification
Type Category Qualification Description Competency Required Skills Operating Systems Windows 10 Novice (1-3 Years) No Skills Others Team work Novice (1-3 Years) No Skills Security Active Directory Proficient (4-6 Years) No