IAM Analyst - Cyber Security

St. Petersburg, Florida, United States - Remote

Pole Star

At Pole Star Space Applications we develop pioneering technologies to keep you at the forefront of maritime insight & empower your real-world decisions. Enquire with us today.

View company page

ABOUT US:

Pole Star Defense is a leading provider of maritime domain awareness, maritime security, and fisheries monitoring systems to the government sector. Since 1998, we have pushed the limits of innovation, mitigating growing threats to ships, supply chains, cargo, territorial waters and, most importantly, safety of lives at sea and beyond. Today, we continue to develop and implement pioneering intelligence technologies to protect customer vessels, people, maritime domain, and reputation.


POSITION DESCRIPTION:

As part of Pole Star Defense’s Information Security team, the IAM analyst will be responsible for the design, implementation, and operational stability of the IAM systems across cloud and on-premises services that align with business goals and objectives. The IAM Analyst will need to understand and interpret technical and business requirements, including participation in the discovery, documentation, validation/refinement of solutions, deployments, and maintenance.


RESPONSIBILITIES:

  • Identifying, analyzing, and resolving system design weaknesses
  • Ensure that solutions protect information resources against unauthorized use, inappropriate degrees of access, disclosure, damage, and/or loss.
  • Troubleshoot and manage resolution of issues related to identities, systems, access, accounts, authentication, authorization, entitlements, and permissions.
  • Ensure the maintenance, patching, and monitoring of IAM systems.
  • Facilitate the continuous adoptions, training, communication, and education of IAM capabilities, functions, and standards.
  • Define, promote, and advise on IAM solutions and best practices by using appropriate standards, processes, procedures, and tools throughout the system development lifecycle.
  • Researching and documenting IAM best practices for devices, applications, and emerging technologies to ensure compliance with standards, controls, and regulatory requirements (e.g., CIS, NIST, GDPR).

Requirements

  • Minimum of 2 years of relevant experience within Cybersecurity industry
  • Hands-on technical experience in systems integration or software engineering of identity and access management (IAM) solutions (such as BeyondTrust, CyberARK) in physical and cloud computing environments
  • Experience with information security concepts such as authentication, access control, and cryptography
  • Experience with Linux/Unix, Windows, scripting (with programming languages such as Bash or PowerShell), SQL, LDAP, and web services.
  • Knowledge of federal and global cybersecurity protection standards, baselines, compliance (e.g., NIST Cybersecurity Framework, NIST 800 series publications, DoD STIGS, CNSSI 1253, DOE SD 205.1, GDPR).


EDUCATION/CERTIFICATIONS:

  • Bachelor’s degree in Computer Science, Information Systems
  • Certifications such as Security+ or other security certification


DESIRED SKILLS (Not Required)

  • Experience working with Defense Information Security Agency (DISA) Security Technical Implementation Guides (STIGs).
  • Experience working with DOD or DHS


TRAVEL REQUIRED: Ability for up to 10% travel both domestic and international.

Benefits

Pole Star Defense offers benefits that are designed to lead an evolving marketplace and encourage a healthy balance between work and life. Highlights of those benefits are listed below

  • Medical, Vision, Dental, Disability insurance for employees and dependents (100% covered by company)
  • Life insurance, company funded to 3x salary
  • 20 days annual leave (can buy or sell more days)
  • Up to a 10% Annual bonus available
  • Up to a 5% 401K matching
  • Gym membership subsidy
  • Volunteer Day PTO
  • Refer-a-friend recruitment bonus


WORK SCHEDULE NOTE: While this position is scheduled for a traditional Monday – Friday work week, our systems run 24/7/365 and as such, you may be expected to perform out of hours, on-call support on an as needed basis. This may include weekends and/or holidays and is worked on a rotation system with other team members. Additional compensation may be available for working on-call, standby or holiday hours


This is a Public Trust position and requires completion of a State and Federal Criminal History Report (i.e., background check) and may require a Department of Defense security clearance. Current and future employment will be contingent upon satisfactory completion of both the FBI Summary History Report and if designated, a DoD security clearance


This position requires use of or access to information subject to the Export Administration Regulations (“EAR”) or the International Traffic in Arms Regulations (“ITAR”). Accordingly, all applicants must be U.S. persons within the meaning of these regulations. Under ITAR, a U.S. person is defined as a U.S. Citizen, U.S. Permanent Resident, or a person who is a protected individual under the immigration and Naturalization Act (8 U.S.C. 1324b(a)(3))


Pole Star Defense is a U.S. Government contractor and is an Equal Opportunity Employer including disability and veterans

COVID 19 CONSIDERATIONS

Pole Star Defense follows all local and federal guidelines on how to best protect its employees, visitors, and guests from the COVID 19 virus. This includes following guidance and implementing policies set forth by the CDC, WHO and OSHA.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Bash C Clearance Cloud Compliance Computer Science Cryptography Cyberark DoD GDPR IAM LDAP Linux Monitoring NIST PowerShell Scripting Security Clearance SQL UNIX Windows

Perks/benefits: Fitness / gym Health care Insurance Medical leave Salary bonus

Regions: Remote/Anywhere North America
Country: United States
Job stats:  83  18  1
Categories: Analyst Jobs IAM Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.