IAM Analyst - Cyber Security
St. Petersburg, Florida, United States - Remote
Applications have closed
Pole Star
At Pole Star Space Applications we develop pioneering technologies to keep you at the forefront of maritime insight & empower your real-world decisions. Enquire with us today.ABOUT US:
Pole Star Defense is a leading provider of maritime domain awareness, maritime security, and fisheries monitoring systems to the government sector. Since 1998, we have pushed the limits of innovation, mitigating growing threats to ships, supply chains, cargo, territorial waters and, most importantly, safety of lives at sea and beyond. Today, we continue to develop and implement pioneering intelligence technologies to protect customer vessels, people, maritime domain, and reputation.
POSITION DESCRIPTION:
As part of Pole Star Defense’s Information Security team, the IAM analyst will be responsible for the design, implementation, and operational stability of the IAM systems across cloud and on-premises services that align with business goals and objectives. The IAM Analyst will need to understand and interpret technical and business requirements, including participation in the discovery, documentation, validation/refinement of solutions, deployments, and maintenance.
RESPONSIBILITIES:
- Identifying, analyzing, and resolving system design weaknesses
- Ensure that solutions protect information resources against unauthorized use, inappropriate degrees of access, disclosure, damage, and/or loss.
- Troubleshoot and manage resolution of issues related to identities, systems, access, accounts, authentication, authorization, entitlements, and permissions.
- Ensure the maintenance, patching, and monitoring of IAM systems.
- Facilitate the continuous adoptions, training, communication, and education of IAM capabilities, functions, and standards.
- Define, promote, and advise on IAM solutions and best practices by using appropriate standards, processes, procedures, and tools throughout the system development lifecycle.
- Researching and documenting IAM best practices for devices, applications, and emerging technologies to ensure compliance with standards, controls, and regulatory requirements (e.g., CIS, NIST, GDPR).
Requirements
- Minimum of 2 years of relevant experience within Cybersecurity industry
- Hands-on technical experience in systems integration or software engineering of identity and access management (IAM) solutions (such as BeyondTrust, CyberARK) in physical and cloud computing environments
- Experience with information security concepts such as authentication, access control, and cryptography
- Experience with Linux/Unix, Windows, scripting (with programming languages such as Bash or PowerShell), SQL, LDAP, and web services.
- Knowledge of federal and global cybersecurity protection standards, baselines, compliance (e.g., NIST Cybersecurity Framework, NIST 800 series publications, DoD STIGS, CNSSI 1253, DOE SD 205.1, GDPR).
EDUCATION/CERTIFICATIONS:
- Bachelor’s degree in Computer Science, Information Systems
- Certifications such as Security+ or other security certification
DESIRED SKILLS (Not Required)
- Experience working with Defense Information Security Agency (DISA) Security Technical Implementation Guides (STIGs).
- Experience working with DOD or DHS
TRAVEL REQUIRED: Ability for up to 10% travel both domestic and international.
Benefits
Pole Star Defense offers benefits that are designed to lead an evolving marketplace and encourage a healthy balance between work and life. Highlights of those benefits are listed below
- Medical, Vision, Dental, Disability insurance for employees and dependents (100% covered by company)
- Life insurance, company funded to 3x salary
- 20 days annual leave (can buy or sell more days)
- Up to a 10% Annual bonus available
- Up to a 5% 401K matching
- Gym membership subsidy
- Volunteer Day PTO
- Refer-a-friend recruitment bonus
WORK SCHEDULE NOTE: While this position is scheduled for a traditional Monday – Friday work week, our systems run 24/7/365 and as such, you may be expected to perform out of hours, on-call support on an as needed basis. This may include weekends and/or holidays and is worked on a rotation system with other team members. Additional compensation may be available for working on-call, standby or holiday hours
This is a Public Trust position and requires completion of a State and Federal Criminal History Report (i.e., background check) and may require a Department of Defense security clearance. Current and future employment will be contingent upon satisfactory completion of both the FBI Summary History Report and if designated, a DoD security clearance
This position requires use of or access to information subject to the Export Administration Regulations (“EAR”) or the International Traffic in Arms Regulations (“ITAR”). Accordingly, all applicants must be U.S. persons within the meaning of these regulations. Under ITAR, a U.S. person is defined as a U.S. Citizen, U.S. Permanent Resident, or a person who is a protected individual under the immigration and Naturalization Act (8 U.S.C. 1324b(a)(3))
Pole Star Defense is a U.S. Government contractor and is an Equal Opportunity Employer including disability and veterans
COVID 19 CONSIDERATIONS
Pole Star Defense follows all local and federal guidelines on how to best protect its employees, visitors, and guests from the COVID 19 virus. This includes following guidance and implementing policies set forth by the CDC, WHO and OSHA.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Bash C Clearance Cloud Compliance Computer Science Cryptography Cyberark DoD GDPR IAM LDAP Linux Monitoring NIST PowerShell Scripting Security Clearance SQL UNIX Windows
Perks/benefits: Fitness / gym Health care Insurance Medical leave Salary bonus
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs