Qualifications & Experience
- Bachelors Degree in Information Technology or related field or 5 years of relevant experience as outlined in the essential duties in lieu of Bachelors Degree.
- 5+ years of experience working in an IT security support role with an emphasis on security/access.
- Demonstrated understanding of network and desktop technology methods that provide innovative solutions to customers.
- Strong customer focus with a successful track record of delivery and operational performance improvements across an organization.
- Excellent verbal and written communication, customer service, and organizational skills.
- Proficient in Microsoft Office programs.
Competencies:
- Exceptionally self-motivated and directed.
- Keen attention to detail.
- Superior analytical, evaluative, and problem-solving abilities.
- Exceptional service orientation.
- Ability to motivate in a team-oriented, collaborative environment
ROLE PURPOSE:
The Identity and Access Management (IAM) Administrator provides, removes, modifies, and reviews user access to information systems at Exact Sciences; including, but limited to, confirm roles and actions are correct based on user function, business need, and policies for least privilege access
Key Responsibilities:
- Identify and develop role-based security access to match job requirements and adhere to the least privilege principle.
- Design
- Create and disable user accounts, as requested, provided appropriate approvals.
- Ensure access rights are updated in a timely manner as needs change due to events; including, but not limited to, termination, role changes, new systems, and regulatory requirements.
- Update and close tasks associated with access management requests and meet service level targets.
- Perform access reviews to ensure access to resources matches job function.
- Develop and document user administration and audit practices.
- Work with application and data owners and business unit leaders to establish and maintain consistent access review activities.
- Manage PAM functions in terms of compliance.
- Ensure compliance with related industry regulations and respond to information security audits.
- Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations.
- Suggest improvements to user access request workflows.
- Assist with audit preparations and help develop responses and action items for an associated finding.
- Provide user access administration training.
- Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration.
- Participate in the design and implementation of centralized user access control administration to internal software applications.
- Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations.
|
Learn more/Apply for this position