Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information Security Access Analyst.
United States Jobs Expertini

Urgent! Information Security Access Analyst Job Opening In Houston – Now Hiring SCI

Information Security Access Analyst



Job description

Our associates celebrate lives.

We celebrate our associates.

Consider the possibilities of joining a Great Place to Work!

GENERAL ACCOUNTABILITIES

The Identity and Access Management Analyst is a key member of the Information Security team.

They are responsible for the management and support of identity and access management systems.

The role will focus on administration and management of tools associated with access management.

The administrator will have the autonomy to leverage their experience and expertise to enforce the appropriate security controls in an auditable and manageable manner.

SPECIFIC RESPONSIBILITIES

80% Analytical and Technical Responsibilities

  • Fully manage SCI’s Identity and Access Management (IAM) tools

  • Support operational issues involving IAM systems and tools

  • Automate manual tasks related to IAM systems and tools

  • Performs other job-related duties as assigned or related to IAM technologies

  • Support existing security configurations including providing routine security administration and troubleshooting security related issues

  • Interface with IT Teams and SCI Business Teams to review access management requirements and design solutions to meet those requirements

  • 10% Administration and Reporting Responsibilities

  • Develop technical documentation for all supported products

  • Develop and maintain detailed documentation of business processes and systems functionality, including workflow, program functions and steps required to execute systems transactions/processes.

  • Provide cross-training for other technical staff on Identity and Access Management responsibilities

  • Create custom reports to meet business needs where necessary

  • Maintain reporting and communications tools for all assigned projects.

  • 10% Audit Administration

  • Prepare documentation for audits and act as the point of contact for audit-related responsibilities

  • Maintain user profiles and ensure that the maintenance process complies with company standards

  • Work with Internal Audit to maintain SOX control and segregation of duties design, setup, and compliance

  • Maintain access management approval matrix

  • Educational / Experience / Minimum Requirements

    Education:

  • Bachelor’s degree (or equivalent experience) in IT or a related field.
  • Experience:

  • Five (5) years of demonstrated Information Security Administration experience supporting Active Directory, Exchange, file shares, Powershell, SQL, M365 Administration, Entra ID, and Identity Access Management (IAM) solutions.
  • Knowledge, Skills & Abilities:

  • Experience with SailPoint’s IdentityNow/Identity Security Cloud, creating access profiles, roles, workflows, configuring sources, and native scripts

  • Experience with Powershell, creating functions/scripts

  • Must have a firm understanding of SQL SELECT and JOIN statements.

  • Demonstrated experience and knowledge of designing and configuring Active Directory security groups and user profiles

  • Demonstrated knowledge of Identity and Access Management business practices

  • Entra ID user/group administration

  • Assigning roles in Azure

  • Microsoft 365 administration

  • Familiarity with the following is a plus: AWS, Okta, Exchange mailbox and group administration (on-prem and cloud), Sharepoint list creation/maintenance, Delinea Secret Server, SAML, OpenID Connect, oAuth, SCIM

  • Must be proficient with Word and Excel

  • Ability to multi-task and change priorities as needed

  • Communication and presentation skills

  • Demonstrated problem solving and decision making skills

  • Ability to follow detailed instructions

  • Core / Critical Competencies

    Build Trust With Others

  • Operates with integrity - Demonstrates honesty; keeps commitments; behaves in a consistent manner.

  • Discloses own positions - Shares thoughts, feelings, and rationale so that others understand personal positions.

  • Remains open to ideas - Listens to others and objectively considers others’ ideas and opinions, even when they conflict with one’s own.

  • Supports others - Treats people with dignity, respect, and fairness; gives proper credit to others; stands up for deserving others and their ideas even in the face of resistance or challenge.

  • Communicate Effectively

  • Organizes the communication - Clarifies purpose and importance; stresses major points; follows a logical sequence.

  • Adjusts to the audience - Frames message in line with audience experience, background, and expectations; uses terms, examples, and analogies that are meaningful to the audience.

  • Ensures understanding - Seeks input from audience; checks understanding; presents message in different ways to enhance understanding.

  • Adheres to accepted conventions - Uses syntax, pace, volume, diction, and mechanics appropriate to the media being used.

  • Contribute to Team Success

  • Facilitates goal accomplishment - Makes procedural or process suggestions for achieving team goals or performing team functions; provides necessary resources or helps to remove obstacles to help the team accomplish its goals.

  • Involves others - Listens to and fully involves others in team decisions and actions; values and uses individual differences and talents.

  • Informs others on team - Shares important or relevant information with the team.

  • Models commitment - Adheres to the team’s expectations and guidelines; fulfills team responsibilities; demonstrates personal commitment to the team.

  • Drive for Results

  • Prioritizes - Identifies more critical and less critical activities / tasks; adjusts priorities when appropriate.

  • Makes preparations - Ensures that required equipment and/or materials are in appropriate locations so that own and others’ work can be done effectively.

  • Schedules - Effectively allocates own time to complete work; coordinates own and others’ schedules to avoid conflicts.

  • Leverages resources - Takes advantage of available resources (individuals, processes, departments, and tools) to complete work efficiently.

  • Stays focused - Uses time effectively and prevents irrelevant issues or distractions from interfering with work completion.

  • Focus on the Customer

  • Uses Key Principles - Establishes good relationships by helping people feel valued, appreciated, and included in discussions (enhances self-esteem, empathizes, involves, discloses, supports).

  • Acknowledges the person - Greets customers promptly and courteously; gives customers full attention.

  • Clarifies the current situation - Asks questions to determine needs; listens carefully; provides appropriate information; summarizes to check understanding.

  • Meets or exceeds needs - Acts promptly in routine situations; agrees on clear course of action in non-routine situations; exceeds expectations without making unreasonable commitments.

  • Confirms satisfaction - Asks questions to check for satisfaction; commits to follow-through, if appropriate; thanks customer.

  • Takes the HEAT - Handles upset customers by hearing them out, empathizing, apologizing, and taking personal responsibility for resolving customer problems/issues.

  • Make Sound Decisions

  • Identifies issues, problems, and opportunities - Recognizes issues, problems, or opportunities and determines whether action is needed.

  • Gathers information - Identifies the need for and collects information to better understand issues, problems, and opportunities.

  • Interprets information - Integrates information from a variety of sources; detects trends, associations, and cause-effect relationships.

  • Understand the Business

  • Understands technical terminology and developments.

  • Performs complex tasks in area of expertise.

  • Work Conditions

    Work Environment

  • Work indoors during all seasons and weather conditions.

  • Hybrid work environment.

    Some days working from the office is required.

  • Standard business dress is required.

  • Work Postures

  • Sitting continuously for many hours per day, up to 6 hours per day
  • Physical Demands

  • Physical effort requiring manual dexterity is required, includes paperwork, calculators, computers and phone usage
  • Work Hours

  • Flexible starting times from 7 AM until 9 AM

  • Postal Code: 77019

    Category (Portal Searching): Information Technology

    Job Location: US-TX - Houston

    Job Profile ID: C00708

    Time Type: Full time

    Location Name: SCI Corporate Office II


    Required Skill Profession

    Computer Occupations



    Your Complete Job Search Toolkit

    ✨ Smart • Intelligent • Private • Secure

    Start Using Our Tools

    Join thousands of professionals who've advanced their careers with our platform

    Rate or Report This Job
    If you feel this job is inaccurate or spam kindly report to us using below form.
    Please Note: This is NOT a job application form.


      Unlock Your Information Security Potential: Insight & Career Growth Guide


    • Real-time Information Security Jobs Trends in Houston, United States (Graphical Representation)

      Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Information Security in Houston, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 37818 jobs in United States and 421 jobs in Houston. This comprehensive analysis highlights market share and opportunities for professionals in Information Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

    • Are You Looking for Information Security Access Analyst Job?

      Great news! is currently hiring and seeking a Information Security Access Analyst to join their team. Feel free to download the job details.

      Wait no longer! Are you also interested in exploring similar jobs? Search now: .

    • The Work Culture

      An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at SCI adheres to the cultural norms as outlined by Expertini.

      The fundamental ethical values are:
      • 1. Independence
      • 2. Loyalty
      • 3. Impartiality
      • 4. Integrity
      • 5. Accountability
      • 6. Respect for human rights
      • 7. Obeying United States laws and regulations
    • What Is the Average Salary Range for Information Security Access Analyst Positions?

      The average salary range for a varies, but the pay scale is rated "Standard" in Houston. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

    • What Are the Key Qualifications for Information Security Access Analyst?

      Key qualifications for Information Security Access Analyst typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

    • How Can I Improve My Chances of Getting Hired for Information Security Access Analyst?

      To improve your chances of getting hired for Information Security Access Analyst, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

    • Interview Tips for Information Security Access Analyst Job Success
      SCI interview tips for Information Security Access Analyst

      Here are some tips to help you prepare for and ace your job interview:

      Before the Interview:
      • Research: Learn about the SCI's mission, values, products, and the specific job requirements and get further information about
      • Other Openings
      • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
      • Dress Professionally: Choose attire appropriate for the company culture.
      • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
      • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
      During the Interview:
      • Be Punctual: Arrive on time to demonstrate professionalism and respect.
      • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
      • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
      • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
      • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
      • Follow Up: Send a thank-you email to the interviewer within 24 hours.
      Additional Tips:
      • Be Yourself: Let your personality shine through while maintaining professionalism.
      • Be Honest: Don't exaggerate your skills or experience.
      • Be Positive: Focus on your strengths and accomplishments.
      • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
      • Turn Off Phone: Avoid distractions during the interview.
      Final Thought:

      To prepare for your Information Security Access Analyst interview at SCI, research the company, understand the job requirements, and practice common interview questions.

      Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the SCI's products or services and be prepared to discuss how you can contribute to their success.

      By following these tips, you can increase your chances of making a positive impression and landing the job!

    • How to Set Up Job Alerts for Information Security Access Analyst Positions

      Setting up job alerts for Information Security Access Analyst is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!