JDXpert Jobs
     
HRTMS Job Description Management

Identity & Access Management (IAM) Engineer

IT SCRTY ANL 3 (007338)

UCPath Position ID: 41068525

 

 

 

Position Description History/Status

For Reference ONLY - PeopleAdmin JA Number:

1142994

Approved Date:

11/13/2024 5:52:22 PM

Date Last Edited:

11/13/2024 5:52:18 PM

Last Action Effective Date:

2/16/2024

Organization Details

Business Unit (Location):

LACMP

Organization Code:

5000O

Organization:

ADMINISTRATIVE VICE CHANCELLOR         

Division Code:

5901D

Division:

ADMINISTRATION                         

Department:

455400 - IT SERVICES

Position Details

UCPath Position Number:

41068525

Position Description ID

169574

UC Payroll Title:

IT SCRTY ANL 3 (007338)

Personnel Program

Professional and Support Staff (PSS)

Salary Grade:

Grade 23

Job Code FLSA:

Exempt

Union Code (Collective Bargaining Unit):

99: Non-Represented (PPSM)

Employee Relations Code:

E: All Others - Not Confidential

Employee Class (Appt Type):

2 - Staff: Career

Full-Time Equivalent (FTE)

1

SUPERVISION

UCPath Reports to Position Number:

41051981

Reports to Payroll Title:

IT SCRTY MGR 1

UCPath Department Head Position Number:

40068309

Department Head Payroll Title:

INFO SYS MGR 4


Level of Supervision Received

GENERAL SUPERVISION - Indicates that the incumbent develops procedures for performance of variety of duties; or performs complex duties within established policy guidelines.


POSITION SUMMARY

The Identity & Access Management (IAM) Engineer will be responsible for the development, implementation, configuration, integration and maintenance of IAM solutions that align with the university's security policies and requirements. This role involves ensuring secure, compliant, and efficient management of identities, credentials, and access controls across all internal and external systems. The IAM Engineer will apply their technical expertise in automation, orchestration, and programming to optimize IAM processes and improve overall efficiency of IAM systems, ensuring seamless integration across various platforms. The IAM engineer is responsible for evaluating hosting platforms, and configuration technologies ensuring consistency between production and non-production environments.

 

 This role will collaborate closely with the IAM Director, IAM and the IAM Analysts, as well as various departments across the university and external vendors to maintain and enhance the security and usability of the IAM framework and, to ensure that access and identity data is granted to users in a secure, compliant, and efficient manner.

 

The IAM Engineer will positively impact UCLA's operations and culture by protecting University stakeholders' information and data in service of the institution's academic mission. This team member will advance the University's mission by delivering exceptional security service comprehensively and consistently across faculty, staff, and students. This role will execute UCLA's vision while modeling UCLA's culture and values.

 


Department Summary

The UCLA Information Security team enables UCLA’s mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university’s digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality.

 

The Identity & Access Management team protects UCLA’s resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards.


Key Responsibilities and Essential Functions

Function

Responsibilities

% Time

Identity & Access Management (IAM)

1.Develops, implements, configures and maintains IAM solutions, including integrations, provisioning, deprovisioning, authentication, and access control systems.

2.Leverages automation and orchestration tools to optimize identity management processes, including user provisioning, deprovisioning, role-based access control (RBAC), attribute-based access control (ABAC) and authentication workflows.

3.Develops scripts and automation routines using programming languages (e.g., Python, PowerShell, Java) to streamline IAM functions and integrate with other enterprise systems.

4.Configures, maintains, and updates IAM platforms and tools to ensure consistent performance and availability in both production and non-production environments.

 

 

20%

Identity & Access Management (IAM)

1.Collaborates with IAM director, IAM analysts and IT teams and stakeholders to ensure smooth implementation and  integration of IAM systems with other IT and security infrastructure.

2.Performs system integration and configuration tasks to ensure the seamless functioning of IAM technologies and tools.

3.Develops monitoring tools and reporting mechanisms to track access events, identify potential security breaches or vulnerabilities, and provide reports to the security team for analysis and auditing purposes.

4.Monitors and analyzes IAM system performance, security, and compliance, recommending improvements and enhancements as necessary.

20%

Identity & Access Management (IAM)

1.Troubleshoots and resolves IAM system issues, working with the appropriate teams to identify root causes and implement corrective actions.

2.Provides technical support and guidance to users and IT teams on IAM tools, processes, and best practices, troubleshooting issues as they arise.

3.Develops and maintains technical documentation, including solution design documents, configuration guides, and process workflows.

4.Assists in the development and implementation of security policies, procedures, and guidelines related to IAM.

15%

Problem Solving

1. Regularly works on issues where analysis of situations or data requires an in-depth evaluation of variable factors

2.Provides hands-on support to troubleshoot and resolve IAM-related technical issues and incidents.

 

10%

Customer Service

1.Identifies, evaluates, and implements advanced IAM measures to safeguard against emerging threats, ensuring the confidentiality, integrity and availability of IAM systems and data.

10%

Continuous Improvement

1.Stays current with IAM technologies, trends, and regulatory requirements, and recommend changes to the university's IAM program as needed.

2.Facilitates innovation and continuous improvement by leveraging the latest industry knowledge and maintains currency with new technologies.

10%

Project Planning & Management

1.Plans and executes system upgrades, bug fixes, and other changes using service management software and methodologies.

5%

Communications & Training

1.Provides timely communications to stakeholders, technical staff, and management as required.

5%

Other

Actively contributes to promoting equity, diversity, and inclusion across the organization and UCLA’s campus. Actively promotes the organization’s core values and consistently integrates innovation, employee fulfillment, teamwork, respect, excellence, integrity, service, and accountability into each aspect of their work. Maintains current knowledge of University policy and procedure; effectively, consistently and fairly applies University policy and/or campus/division procedures for assigned area and team members supervised; complies with University, Campus and division policies and procedures regarding privacy of information, authorized use of University resources and the security of University systems and data. Performs other related responsibilities as requested and when necessary.

5%


Other Requirements - Applies to all Positions

•

Performs other duties as assigned.

•

Complies with all policies and standards.

•

Complies with the University of California, Los Angeles (UCLA) Principles of Community.

•

This position description is not intended to be a complete list of all responsibilities, duties or skills required for the job and is subject to review and change at any time, with or without notice, in accordance with the needs of the organization.


QUALIFICATIONS


Educational Requirements

Education Level

Education Details

Required/
Preferred

And/Or

Bachelor's Degree

in cybersecurity, information technology, computer science, public administration, business administration, communications, or related field, or equivalent experience/training.

Required

 


Experience Requirements

Experience

Experience Details

Required/
Preferred

And/Or

3 years

experience working in one or more of the following fields: cybersecurity, computer science, computer information systems, or related field.

Required

 

 

Advanced experience using identity and access tools and systems in a distributed IT environment

Required

 

 

Hands-on experience with implementation and configuration of directory services (e.g., Active Directory, LDAP), authentication and federation (e.g., Single Sign-On (SSO)) technologies.

Required

 

 

Hands-on experience with implementation and configuration of multi-factor authentication (MFA) solutions.

Required

 

 

Experience participating in activities to advance an inclusive environment that values equity, diversity, inclusion and belonging.

Required

 

 

Experience in complex higher education environments, serving academic and administrative functions of a large public university.

Preferred

 

5+ years

experience working in one or more of the following fields: cybersecurity, computer science, computer information systems, etc.

Preferred

 


Licenses, Certifications and Professional Affiliations

One or more of the following certifications: CCNP Security, CCIE Security, OSCP, CISSP, CEH, or equivalent certification.

 

Preferred

 

CCIE Security certification.

 

Preferred

 


Knowledge, Skills and Abilities

KSAs

Required/
Preferred

Demonstrated skills applying authentication and account management standards to vendor provisioning solutions, computer software and hardware at scale.

Required

Advanced knowledge of IAM infrastructure deployment and configuration. Ability to review and diagnose system issues and implement preventative maintenance to ensure proactive continuity of services.

Required

Proficient in scripting and programming languages (e.g., PowerShell, Python, Java) for automation and integration purposes.

Required

Demonstrated expertise in technologies and products, such as: SCIM,  J2EE, Java Servlets, XML, Web Services, Perl/CGI, SSL, etc.

Required

Strong written and verbal communication skills and is able to communicate technical information and ideas to a diverse community of colleagues and stakeholders.

Required

Able to establish and advance positive working relationships and a strong rapport with team members, stakeholders, and customers.

Required

Strong organizational skills and is able to balance competing priorities and support concurrent projects. Experience working in a project-based environment using leading project management practices including schedule management, status reporting, and communication of project risks and issues.

Required

Strong demonstrated problem-solving skills; scopes solutions based on knowledge of available resources and timelines. Able to ask questions, gather information, evaluate options, and make decisions with integrity.

Required

Thinks creatively and proposes innovative ideas, including the incorporation of new technologies or processes. Is able to work with agility in a fast-paced environment.

Required


SPECIAL REQUIREMENTS AND/OR CONDITIONS OF EMPLOYMENT


Reporting and Background Check Requirements

Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation.

Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment.


Travel Requirements

Estimated Amount

Description

0%

 


LOCATION AND PHYSICAL, ENVIRONMENTAL, MENTAL (PEM) REQUIREMENTS

Environment and Work Location Information

Environment Type:

Non-Clinical Setting

Location Setting:

Campus

Location:

Wilshire Center


Physical Requirements

The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position.

Physical Requirements

Never

0 Hours

Occasional

Up to 3 Hours

Frequent

3 to 6 Hours

Continuous

6 to 8+ Hours

Is Essential

Standing/Walking

 

 

X

 

 

Sitting

 

 

X

 

 

Bending/Stooping

 

X

 

 

 

Squatting/Kneeling

 

X

 

 

 

Climbing

X

 

 

 

 

Lifting/Carrying/Push/Pull 0-25 lbs

 

X

 

 

 

Lifting/Carrying/Push/Pull 26-50 lbs

X

 

 

 

 

Lifting/Carrying/Push/Pull over 50 lbs

X

 

 

 

 

Physical requirements other

X

 

 

 

 


Environmental Requirements

The environmental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position.

Exposures

Never

0 Hours

Occasional

Up to 3 Hours

Frequent

3 to 6 Hours

Continuous

6 to 8+ Hours

Is Essential

Chemicals, dust, gases, or fumes

X

 

 

 

 

Loud noise levels

X

 

 

 

 

Marked changes in humidity or temperature

X

 

 

 

 

Microwave/Radiation

X

 

 

 

 

Operating motor vehicles and/or equipment

X

 

 

 

 

Exposures other

X

 

 

 

 


Mental Requirements

The mental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position.

Exposures

Never

0 Hours

Occasional

Up to 3 Hours

Frequent

3 to 6 Hours

Continuous

6 to 8+ Hours

Is Essential

Sustained attention and concentration

 

 

X

 

X

Complex problem solving/reasoning

 

 

X

 

X

Ability to organize & prioritize

 

 

X

 

X

Communication skills

 

 

X

 

X

Numerical skills

 

X

 

 

X

Mental demands other

X

 

 

 

 


Blood/Fluid Exposure Risk

The exposure described here is what can be expected of an employee in performing the essential functions of this position.

X

Classification 3:  Position in which exposure to blood, body fluids or tissues is not part of the position description. The normal routine task involves no exposure to blood, body fluids or tissues and the employee can decline to perform tasks which involve a perceived risk without retribution.