HRTMS Job Description Management
| Senior Identity & Access Management (IAM) Analyst IT SCRTY ANL 4 (000661) UCPath Position ID: TBD_628 | | |
Position Description History/Status | Approved Date: | 11/19/2024 3:56:29 PM | Date Last Edited: | 11/19/2024 3:56:26 PM | Last Action Effective Date: | 4/29/2024 | Organization Details | Business Unit (Location): | LACMP | Organization Code: | 5000O | Organization: | ADMINISTRATIVE VICE CHANCELLOR | Division Code: | 5901D | Division: | ADMINISTRATION | Department: | 455400 - IT SERVICES | Position Details | UCPath Position Number: | TBD_628 | Position Description ID | 172832 | UC Payroll Title: | IT SCRTY ANL 4 (000661) | Business Title: | Senior Identity & Access Management (IAM) Analyst | Personnel Program | Management and Senior Professional (MSP) | Salary Grade: | Grade 25 | Job Code FLSA: | Exempt | Union Code (Collective Bargaining Unit): | 99: Non-Represented (PPSM) | Employee Relations Code: | E: All Others - Not Confidential | Employee Class (Appt Type): | 2 - Staff: Career | Full-Time Equivalent (FTE) | 1 | SUPERVISION | UCPath Reports to Position Number: | 41051981 | Reports to Payroll Title: | IT SCRTY MGR 1 | UCPath Department Head Position Number: | 40068309 | Department Head Payroll Title: | INFO SYS MGR 4 | | | |
Level of Supervision Received | GENERAL SUPERVISION - Indicates that the incumbent develops procedures for performance of variety of duties; or performs complex duties within established policy guidelines. |
POSITION SUMMARY | The Senior Identity & Access Management (IAM) Analyst will be responsible for leading the solution design, implementation, and support of advanced identity and access management data, processes, and technologies from conception to post deployment. The Sr. IAM Analyst will apply deep technical expertise in IAM tools, protocols, and architecture to create robust access controls, authentication mechanisms, and identity governance solutions that align with organizational goals. This role has experience integrating IAM technologies into complex IT environments and will ensure seamless and secure access to applications, data, and services for internal and external users. This roll performs and guides technical evaluations and implements complex vendor or customized applications and plays a critical role in safeguarding sensitive information, ensuring regulatory compliance, and enabling seamless and secure access. This role will work collaborate closely with the IAM Director, various departments and stakeholders across the university, as well as external vendors, to ensure quality of identity data, the establishment of data standards, and the appropriate access levels are granted to users in a timely, secure, and compliant manner, focusing on optimization and automation wherever possible. In addition, the position will evaluate and test new software and upgrades. The Senior IAM Analyst will produce documentation, procedures, and any necessary materials to support IAM services. The Senior IAM Analyst will also mentor and guide junior analysts in the team. The Senior IAM Analyst will positively impact UCLA's operations and culture by protecting University stakeholder's information and data in service of the institution's academic and research mission. This team member will advance the University's mission by delivering exceptional IAM service comprehensively and consistently across faculty, staff, students, and persons of interest. This role will execute UCLA's vision while modeling UCLA's culture and values. | | | |
Department Summary | The UCLA Information Security team enables UCLA’s mission by providing leadership and expertise that assures the confidentiality, integrity, safeguarding, and availability of the university’s digital information resources. The Information Security team enables efficient campus wide cyber incident detection and response procedures. In addition, the team implements risk management strategies to identify vulnerabilities and threats to campus information resources and enterprise systems. This includes executing a comprehensive information security plan, centered on implementing and enforcing technical and physical security measures to treat identified risks based on their sensitivity or criticality. The Identity & Access Management team protects UCLA’s resources and digital assets as well as supports university business operations through effective and seamless access management. This includes account lifecycle management, authentication, and role-based access controls at the enterprise level. The IAM team is responsible for managing digital identities and ensuring the proper access controls are in place ensuring sensitive information protection. The team drives the creation and management of university IDs for faculty, staff, and students and the IAM infrastructure to guarantee secure and efficient access to information systems and resources. Furthermore, the team implements rigorous regulation of entitlements through granular access control and the auditing of all digital identities managed by UCLA by adhering to the best practices and latest regulatory standards. |
Key Responsibilities and Essential Functions | Function | Responsibilities | % Time | Identity & Access Management (IAM) | 1.Design and lead implementation of scalable IAM solutions and support of the university's advanced IAM processes and technologies, including provisioning, deprovisioning, authentication, and access control aligned with organizational security policies and industry standards, ensuring robust identity governance and access management. 2.Lead initiatives to centralize identity and access management across multiple platforms, ensuring scalability and high availability. | 15% | Identity & Access Management (IAM) | 1.Ensure that IAM processes comply with organizational security policies, industry regulations, Federal NIST recommendations, international standards such as REFEDS, and mandated California and University of California policies. 2.Collaborates with IAM director, IAM Engineer, IT teams and external and internal stakeholders to gather requirements, design, and implement IAM processes and technologies that meet the university's access, entitlement, and security policies and goals. | 15% | Identity & Access Management (IAM) | 1.Ensures standards and framework compliance by providing well-documented standards, data models, and information system diagrams. 2.Participates in the design and integration review of all critical IAM system designs and provides technical guidance in the selection and implementation processes. 3.Performs regular audits and reviews of user access levels, ensuring compliance with university policies and regulatory requirements, and providing recommendations for improvements. | 10% | Identity & Access Management (IAM) | 1.Provides guidance to internal and external teams who develop highly complex systems supporting or depending on IAM procedures or frameworks. 2.Investigates and resolves complex access-related issues, working with the appropriate teams to identify root causes and implement corrective actions. 3.Monitors, analyzes, and optimizes IAM system performance and security, recommending improvements and enhancements as necessary. 4.Develops, implements, and maintains security policies, procedures, and guidelines related to IAM, while ensuring alignment with the university's overall security strategy. | 5% | Problem Solving | 1.Identifies, evaluates, and implements advanced IAM measures to safeguard against emerging threats, ensuring the confidentiality, integrity and availability of IAM data and systems. 2.Perform regular audits of IAM systems to ensure compliance with internal policies and external regulations. | 10% | Customer Service | 1.Responds to stakeholder inquiries and concerns regarding IAM and security, integrating business requirements to provide clear and concise information and guidance, thereby ensuring alignment with organizational objectives and customer satisfaction. 2.Actively engages with stakeholder to understand their needs and translates their business requirements into IAM functional reequipments and automated processes. | 10% | Continuous Improvement | 1.Routinely evaluates and improves IAM processes and procedures, utilizing automation and tooling to increase efficiency and accuracy.             2.Maintains up-to-date knowledge of IAM technologies, trends, and regulatory requirements, and recommends changes to the university's IAM program as needed. 3.Lead continuous assessment of IAM technologies and practices, identifying opportunities for IAM architecture optimization, process and user experience improvement, automation, and enhanced security measures. 4.Monitor the evolving threat landscape and recommend updates or changes to IAM policies and technologies to mitigate potential risks. | 10% | Project Planning & Management | 1.Manages complex IAM projects, including testing upgrades, security fixes, and other system changes, ensuring successful delivery within scope, budget and timeline. 2.Facilitates collaboration with cross-functional project teams to deliver comprehensive identity data solutions, provisioning, and authentication services. This role involves proactive engagement in complex partner projects, ensuring seamless integration and troubleshooting across various business verticals. | 10% | Communications & Training | 1.Provide guidance and training to IT staff and business users on IAM policies and best practices. 2.Provides timely communications to stakeholders, technical staff, and management as required. Communicates and report identity and access incidents and issues to university and IT leaders.3.             3.Provides guidance, training, and mentorship to university staff and junior IAM analysts on IAM processes and best practices. | 10% | Other | Actively contributes to promoting equity, diversity, and inclusion across the organization and UCLA’s campus. Actively promotes the organization’s core values and consistently integrates innovation, employee fulfillment, teamwork, respect, excellence, integrity, service, and accountability into each aspect of their work. Maintains current knowledge of University policy and procedure; effectively, consistently and fairly applies University policy and/or campus/division procedures for assigned area; complies with University, Campus and division policies and procedures regarding privacy of identity information, authorized use of University resources and the appropriate access to University systems and data. Performs other related responsibilities as requested and when necessary. | 5% | | | | | |
Other Requirements - Applies to all Positions | • | Performs other duties as assigned. | • | Complies with all policies and standards. | • | Complies with the University of California, Los Angeles (UCLA) Principles of Community. | • | This position description is not intended to be a complete list of all responsibilities, duties or skills required for the job and is subject to review and change at any time, with or without notice, in accordance with the needs of the organization. | | | |
Educational Requirements | Education Level | Education Details | Required/ Preferred | And/Or | Bachelor's Degree | Cybersecurity, information technology, computer science, public administration, business administration, communications, or related field, or equivalent combination of experience/training. | Required | | | | | | | | |
Experience Requirements | Experience | Experience Details | Required/ Preferred | And/Or | Five years | Experience working in one or more of the following fields: IAM, cybersecurity, computer science, computer information systems, or related field. | Required | | | Advanced experience using identity and access tools and systems in a distributed IT environment | Required | | | Expert knowledge and experience of IAM principles, technologies, and best practices, including experience with role-based access control (RBAC), attribute-based access control (ABAC). | Required | | | Expert knowledge and experience of IAM principles, technologies, and best practices, including experience with access governance (IGA), and privileged access management (PAM). | Required | | | Advanced experience in supporting IT security requirements with identity and access logs and audit records. Expertise relating to the design and development of software across the organization. | Required | | | Experience working in a project-based environment using leading project management practices including schedule management, status reporting, and communication of project risks and issues. | Required | | | Experience participating in activities to advance an inclusive environment that values equity, diversity, inclusion and belonging. | Required | | Seven or more years | Experience working in one or more of the following fields: IAM, cybersecurity, computer science, computer information systems, etc. | Preferred | | | Experience in complex higher education environments, serving academic research and administrative functions of a large public university. | Preferred | | | | | | | | |
Knowledge, Skills and Abilities | KSAs | Required/ Preferred | Demonstrated skills applying secure user authentication and account management standards to vendor provisioning solutions, computer software, and hardware at scale. | Required | Demonstrated skill at administering complex access data based on validated data source systems. | Required | Familiarity with directory services (e.g., Active Directory, LDAP), and authentication and federation (e.g., Single Sign-On (SSO)) technologies, and multi-factor authentication (MFA) solutions. | Required | Demonstrated ability to translate business needs into long-term architecture solutions. | Required | Strong written and verbal communication skills and is able to communicate complex technical ideas to a diverse community of colleagues and stakeholders. Can relay technical information to audiences of technical and non-technical stakeholders. | Required | Able to establish and advance positive working relationships and a strong rapport with a diverse community of colleagues including team members, stakeholders, and customers. | Required | Advanced organizational skills and is able to balance competing priorities and deliver concurrent projects to various stakeholder types. | Required | Advanced problem-solving skills; ability to uncover root of difficult problems and scope solutions based on knowledge of available resources and timelines as well as awareness of vision and strategy. | Required | Seeks information from multiple and diverse sources to inform solutions. Demonstrated ability to make decisions with integrity. | Required | Thinks creatively and introduces innovations such as the incorporation of new technologies or processes. Thrives in an ever-changing, fast-paced environment. | Required | | | |
SPECIAL REQUIREMENTS AND/OR CONDITIONS OF EMPLOYMENT |
Reporting and Background Check Requirements | Background Check: Continued employment is contingent upon the completion of a satisfactory background investigation. | Live Scan Background Check: A Live Scan background check must be completed prior to the start of employment. |
LOCATION AND PHYSICAL, ENVIRONMENTAL, MENTAL (PEM) REQUIREMENTS | Environment and Work Location Information | Environment Type: | Non-Clinical Setting | Location Setting: | Campus | Location: | | | | |
Physical Requirements | The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Physical Requirements | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Standing/Walking | | | X | | | Sitting | | | X | | | Bending/Stooping | | X | | | | Squatting/Kneeling | | X | | | | Climbing | X | | | | | Lifting/Carrying/Push/Pull 0-25 lbs | | X | | | | Lifting/Carrying/Push/Pull 26-50 lbs | X | | | | | Lifting/Carrying/Push/Pull over 50 lbs | X | | | | | Physical requirements other | X | | | | | | | | | | | | | | | |
Environmental Requirements | The environmental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Exposures | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Chemicals, dust, gases, or fumes | X | | | | | Loud noise levels | X | | | | | Marked changes in humidity or temperature | X | | | | | Microwave/Radiation | X | | | | | Operating motor vehicles and/or equipment | X | | | | | Exposures other | X | | | | | | | | | | | | | | | |
Mental Requirements | The mental requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this position. | Exposures | Never 0 Hours | Occasional Up to 3 Hours | Frequent 3 to 6 Hours | Continuous 6 to 8+ Hours | Is Essential | Sustained attention and concentration | | | X | | X | Complex problem solving/reasoning | | | X | | X | Ability to organize & prioritize | | | X | | X | Communication skills | | | X | | X | Numerical skills | | X | | | X | Mental demands other | X | | | | | | | | | | | | | | | |
Blood/Fluid Exposure Risk | The exposure described here is what can be expected of an employee in performing the essential functions of this position. | X | Classification 3: Position in which exposure to blood, body fluids or tissues is not part of the position description. The normal routine task involves no exposure to blood, body fluids or tissues and the employee can decline to perform tasks which involve a perceived risk without retribution. | | | |
|