IAM Analyst

Dunhill Professional Search

Washington, DC

JOB DETAILS
SALARY
$57,000–$79,000 Per Year
SKILLS
Analysis Skills, Atlassian JIRA, Computer Science, Computer Security, Corrective Action, Cross-Functional, Customer Support/Service, Documentation, Enterprise Protection, FDA (Food and Drug Administration), Identify Issues, Identity Data Management, Incident Response, Information Technology & Information Systems, Information/Data Security (InfoSec), Intelligence Gathering, Internet Security, Laboratory, Maintain Compliance, Microsoft SharePoint, Network Security, Onboarding, Operations Management, Patient Assessment, People Management, Procedure Development, Process Flow, Regulations, Requirements Management, Requirements Validation/Verification, Security Analysis, Security Architecture, Security Attacks, Security Monitoring, Service Level Agreement (SLA), Spreadsheets, Standard Operating Procedures (SOP), Standards Development, System Architecture, System Lifecycle, Systems Administration/Management, Systems Analysis, Teleconferencing, Test Plan/Schedule, Testing, Time Management, United States Citizen, Use Cases, Videoconferencing
LOCATION
Washington, DC
POSTED
Today

IAM Analyst - Tier 1

(FullTime / Hybrid - DC / 2+ Years of experience with - IAM, Cybersecurity, or Systems Security)

 

Job Description

  • The Tier 1 IAM Analyst supports identity and access management (IAM) operations while contributing to broader cybersecurity initiatives. This role is responsible for executing day-to-day access management tasks, supporting users, and assisting in the protection of systems and data through security analysis, monitoring, and compliance activities. The analyst works under established procedures and guidance while gaining exposure to system architecture, security controls, and enterprise IT environments.
  • The Tier 1 Analyst collaborates with IAM, cybersecurity, and project teams to ensure secure access provisioning, support incident response efforts, and contribute to maintaining compliance with federal and client security requirements.

 

Key Responsibilities

 

IAM Operations & Access Management

  • Perform initial triage of access-related communications, requests, and tickets; route appropriately based on procedures
  • Process user access requests (provisioning, modification, deactivation) using workflow tools such as Jira.
  • Manage ticket queues, follow up on aging requests, and ensure timely completion within defined SLAs.
  • Post access requests for approval (e.g., SharePoint, ISSO/COR coordination).
  • Maintain tracking logs and spreadsheets for onboarding, offboarding, and access audits.
  • Generate and distribute reports (daily, weekly, monthly), including deactivation and audit reports.

User Support & Documentation

  • Communicate with end users to troubleshoot access issues and provide guidance.Develop and maintain Standard Operating Procedures (SOPs), knowledge articles, and user guides.
  • Assist in updating audit artifacts, process flows, and system documentation.

 

Cybersecurity & Risk Support

  • Assist with research and analysis to identify, mitigate, and prevent cybersecurity risks.
  • Support the development of cybersecurity tools, methods, and acceptance criteria for system security.
  • Investigate security incidents to determine scope, impact, and potential compromise.
  • Contribute to security validation activities, including testing systems and identifying vulnerabilities.
  • Participate in audit reviews and monitor corrective actions through closure.
  • Assist in maintaining incident response, threat assessment, and damage assessment programs.
  • Support Security Test & Evaluation (ST&E) activities, including preparation, execution, and reporting.

 

Collaboration & Escalation

  • Work closely with Tier 2/Tier 3 teams on escalations, audits, and project-based initiatives.
  • Support compliance efforts, including third-party audits and major system releases.
  • Escalate complex issues or unclear requirements to senior analysts or team leads.

 

Qualifications

  • US Citizen with a Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or related field (or equivalent experience).
  • 2 + years of experience in IAM, cybersecurity, or systems security.
  • Able to Obtain a Public Trust Clearance

#cjpost

  • Analyzed cyber threat information with security partners across multiple sectors to achieve situational awareness
  • Work together with Sponsor personnel to develop relationships across industry
  • Coordinate the translation requirements into technical solutions with IT
  • Determine software assurance and system lifecycle management
  • Perform a variety of developmental tasks relating to security control testing and evaluation and the ensuing system analysis and documentation as relates to each system
  • Promising new concepts and technologies developed in the USAMRMC laboratories through advanced development and the regulatory process to obtain U.
    S.
    FDA certification
  • Facilitate coordination and attendance at meetings: teleconferences, video teleconferences, integrated test team working groups, exercise planning, test plan working groups, core team meetings
  • Provide situational awareness reports to DISA leadership
  • Perceived as both the customer's and internal security team's trusted advisor
  • Manage cyber security initiatives for the protection of the entire North American power grid
  • Assist clients with identifying unauthorizedactivities and intrusions in networks in real time
  • Target mappings, supplemental specifications and/or use cases
  • Assessing each event based on factual information and wider contextual information
  • Provide content for cyber training programs
  • Implement and enforce security policies across the organization
  • Display a high level of critical thinking in bringing successful resolution to high-impact, complex, and/or cross-functional problems
  • Completing real-time analysis of Cyber Incidents and conducting follow-up with the reporting customer to remediate findings
  • Ensure proper training of subordinates
  • Supporting activities related to the implementation and use of tools for intelligence gathering, analysis
  • Perform testing to validate established security requirements

About the Company

D

Dunhill Professional Search