Gathering your results ...
2 days
Not Specified
Not Specified
Not Specified
<p>About Analog Devices</p> <p>Analog Devices, Inc. (NASDAQ: ADI ) is a global semiconductor leader that bridges the physical and digital worlds to enable breakthroughs at the Intelligent Edge. ADI combines analog, digital, and software technologies into solutions that help drive advancements in digitized factories, mobility, and digital healthcare, combat climate change, and reliably connect humans and the world. With revenue of more than $9 billion in FY24 and approximately 24,000 people globally, ADI ensures today's innovators stay Ahead of What's Possible. Learn more at www.analog.com and on LinkedIn and Twitter (X).</p> <p>Cybersecurity - Sr. Staff Analyst - Identity Governance</p> <p>Position Summary</p> <p>This position will be a part of the Cyber Security team and requires a strong background in both cybersecurity as well as foundational identity management technology and architecture. The Cybersecurity Sr. Staff Analyst (Identity Governance) will lead and support Identity Governance initiatives, including but not limited to, supporting the implementation of an IGA platform, (PAM) Privileged Access Management, establishing RBAC and enforcing SOD (Separation of duties) as well as least privileged policies, optimization and standardization of MFA across the environment and continue our maturity towards password-less authentication, and ZTNA.</p> <p>This role is a senior-level contributor that will directly lead governance program activities focused on the continuous maturity of our identity access management program and technologies. This individual will continually influence the maturity and adoption of strong identity security practices across ADI.</p> <p>This role will directly support the Delinea PAM platform architecture and configuration, particularly the migration to Delinea's SAAS platform to ensure Privileged Roles are managed to ADI's Policy and Standards, as well as ensure compliance to our regulatory obligations (SOX, CMMC, TISAX, HIPAA etc).</p> <p>In addition - This role will also be focused on the integration and alignment of identity governance into the engineering and manufacturing environments and supporting our strategy for ZTNA enablement which heavily leverages strict identity verification mechanisms.</p> <p>Key Responsibilities</p> <ul> <li> <p>Identity Governance:</p> </li><li> <p>Design, implement and manage identity governance and assurance (IGA) controls and platforms to support user provisioning, deprovisioning, access requests and UARs/access recertifications. Implementing automation for these processes, streamlining the end user experience and internal IT provisioning/entitlement processes, utilizing AI for further efficiency wherever possible.</p> </li><li> <p>Design, manage and mature role-based access control (RBAC) to enforce least privilege access with each user and devices grant access only to the specific applications or data necessary for their roles, limiting potential exposure and minimizing the risk of data breaches or unauthorized access.</p> </li><li> <p>Develop, validate, and maintain detailed documentation on standard operating procedures, system configurations, and technical settings for IGA team technologies and processes.</p> </li><li> <p>Investigate and respond to identity-related incidents, violations and anomalous access behavior identified in IGA monitoring and reporting systems.</p> </li><li> <p>Continuously monitor data access activity, identify potential security risks, and maintain a clear audit trail of data access events.</p> </li><li> <p>Working with IT, HR and other business partners develop, refine, automate and streamline identity lifecycle processes (joiner/mover/leaver provisioning, de-provisioning), and establish birthright entitlement structures and mature identity verification processes.</p> </li><li> <p>Collaborate across compliance, and IT teams to align Identity Governance to ADI's regulatory requirements (e.g., SOX, CMM, TISAX, HIPAA).</p> </li><li> <p>Monitor and remediate orphan accounts, access violations, and segregation of duties (SoD) conflicts.</p> </li><li> <p>Troubleshoot identity-related issues and provide Tier 3 support for Cyber Identity-related incidents.</p> </li><li> <p>Automate workflows using PowerShell, Python, or similar scripting languages.</p> </li><li> <p>Participate in ongoing auditing and risk assessments, and implementation of audit recommendations.</p> </li><li> <p>UARS- User Access Certifications:</p> </li><li> <p>Working with Cyber Identity Governance team members to directly manage all aspects of the User Access Review (UAR) process for the enterprise-supported access program including regulatory environments/applications. This includes planning and executing quarterly UARs for all systems participating in this program and continuing to mature the automation around these processes.</p> </li><li> <p>Ensure all evidence of authorization is documented and archived according to internal standards.</p> </li><li> <p>Identifying and engaging with participating system partners across the company to ensure readiness and engagement for regular UARs</p> </li><li> <p>Producing and maintaining data reporting, analysis, dashboards and scorecards in support of overall UAR health, execution, and closure.</p> </li><li> <p>IT IAM Team Collaboration and Foundational IAM Architecture Support:</p> </li><li> <p>Assist IT partners with the design of Identity and Access Management solutions, Single Sign-On (SSO), and Multi-Factor Authentication (MFA) solutions for various use cases across the organization.</p> </li><li> <p>Collaborate with various Security, IT teams and partners such as IAM architecture, IT networking etc. to mature ADI's ZTNA capabilities based upon continuous access evaluation of users and device behaviors. Design and implement solid operational processes to manage situations where access anomalies are detected that access may be revoked and/or enforce additional authentication requirements.</p> </li><li> <p>Assist IT IAM Engineers in architecting solutions for the business and ensuring those solutions adhere to ADI's Cybersecurity policies and standards, as well as utilizing industry's best practices for Identity Security.</p> </li><li> <p>Assist IT partners and teams with troubleshooting issues with IAM tools and processes as needed.</p> </li><li> <p>Works across IT and Cybersecurity infrastructure and architecture SMEs to ensure that all aspects of the security solution architecture are defined, documented and tested, with adherence to Policies and Standards. Change Management and Architecture Review Board processes.</p> </li><li> <p>Collaborating with IT IAM leads as well as IT business managers to understand new business requirements, and to collaboratively design solutions that align with enterprise Policy & standards and industry best practices for identity security.</p> </li><li> <p>Privilege Access Management:</p> </li><li> <p>Directly support the Delinea PAM platform architecture and configuration, successful migration to Delinea's SAAS platform, and support for on-prem instances in our regulated Enclaves.</p> </li><li> <p>Ensure Privileged Roles are managed to ADI's Policy and Standards, as well as ensure compliance with our regulatory obligations (SOX, CMMC, TISAX, HIPAA etc.).</p> </li><li> <p>Continue to support and refine technical PAM solutioning that aligns to enterprise architecture strategies, current state environment, support of various business use cases and proactively defend against evolving security risks.</p> </li><li> <p>Develop, validate, and maintain detailed documentation on standard operating procedures, system configurations, and technical settings for internal team use, end user support, and other business teams as needed.</p> </li><li> <p>Stay current with emerging IAM, PAM and IGA technologies, industry security best practices and regulatory compliance changes which would introduce new identity specific control requirements.</p> </li></ul> <p>Required Qualifications</p> <ul> <li>Bachelor's degree in Cybersecurity, Computer Science, or related field. </li><li>Minimum 7- 9 years of experience, 10+ preferred, within IT, IAM or Cyber Security, with hands-on experience in Identity and Access Management or related security roles. </li><li>Minimum of 5 years working with common industry IGA solutions (e.g., SailPoint, Saviynt), development and configuration. </li><li>Expert understanding of Privileged Access Management (PAM) and Identity Management/IAM Governance principles. </li><li>Extensive knowledge of Active Directory, Microsoft Entra, LDAP, Redhat Identity solutions and SSO including deployment, administration, and troubleshooting. </li><li>Hands-on experience with IGA tools (e.g., SailPoint, Saviynt). </li><li>Hands-on experience with Privileged Access Management Solutions (particularly Delinea . This includes deployment, integrations, Engineering, and adoption strategies of PAM for large scale enterprises, including secrets key management on multi cloud environments (AWS / Azure), Dev Ops and Orchestration platforms. </li><li>Strong understanding of identity lifecycle, RBAC, policy-based access controls. </li><li>Strong understanding of Active Directory, Azure AD/Entra, Group Policy and cloud identity models. </li><li>Strong knowledge of Conditional Access policy configurations in AD/Entra, as well as MFA (DUO and Microsoft Authenticator). </li><li>Demonstrated expertise in leading strategic, organization-wide identity and security initiatives; providing reports to executive stakeholders; and facilitating the successful adoption. </li><li>Knowledge of security frameworks (NIST, ISO 27001) and regulatory compliance requirements (SOX, CMMC, PCI, etc.). </li><li>Proficiency in scripting and automation (PowerShell, Python). </li><li>Excellent problem-solving and communication skills. </li><li>Familiarity with principals of ZTNA, specifically Identity verification methods, technologies and architectures. Authorization and Posture: Verifying each access attempt based on factors like identity, location, and device health, strengthening overall security posture and minimizing unauthorized access. </li><li>Experience with audits and compliance processes in highly regulated environments </li></ul> <p>Preferred Qualifications</p> <ul> <li>Relevant certifications: CISSP, CISM, Microsoft Identity and Access Administrator, SailPoint Certified Engineer. </li><li>Experience with Zero Trust architecture and identity federation. </li></ul> <p>Soft Skills</p> <ul> <li>Strong analytical and troubleshooting abilities. </li><li>Ability to work collaboratively across teams. </li><li>Detail-oriented with a focus on security and compliance. </li></ul> <p>For positions requiring access to technical data, Analog Devices, Inc. may have to obtain export licensing approval from the U.S. Department of Commerce - Bureau of Industry and Security and/or the U.S. Department of State - Directorate of Defense Trade Controls. As such, applicants for this position - except US Citizens, US Permanent Residents, and protected individuals as defined by 8 U.S.C. 1324b(a)(3) - may have to go through an export licensing review process.</p> <p>Analog Devices is an equal opportunity employer. We foster a culture where everyone has an opportunity to succeed regardless of their race, color, religion, age, ancestry, national origin, social or ethnic origin, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, parental status, disability, medical condition, genetic information, military or veteran status, union membership, and political affiliation, or any other legally protected group.</p> <p>EEO is the Law: Notice of Applicant Rights Under the Law.</p> <p>Job Req Type: Experienced</p> <p>Required Travel: Yes, 10% of the time</p> <p>Shift Type: 1st Shift/Days</p> <p>The expected wage range for a new hire into this position is $154,400 to $212,300.</p> <ul> <li> <p>Actual wage offered may vary depending on work location, experience, education, training, external market data, internal pay equity, or other bona fide factors.</p> </li><li> <p>This position qualifies for a discretionary performance-based bonus which is based on personal and company factors.</p> </li><li> <p>This position includes medical, vision and dental coverage, 401k, paid vacation, holidays, and sick time, and other benefits.</p> </li></ul>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!