logo

View all jobs

IT Security Administrator

Menomonee Falls, WI
Duties: Responsible for providing direction and technical expertise needed to design, implement and maintain the F&CH Information Systems security environment. This role includes responsibility for developing and implementing appropriate IS security policies and procedures, configuring security software, and implementing security administration functions across multiple operating systems and hardware platforms. The ability to effectively communicate with all levels of the business on security issues, ensuring that the companies information assets are properly protected, is essential. Other duties as assigned.
Develop and maintain the Identity and Access Management systems and standards.
Perform daily quality checks that IAM systems are performing tasks correctly.
Create, modify, and troubleshoot security access to networks and applications.
Identify, log, and resolve Identity and Access Management tickets. Monitor the status of tickets and advise customers of status in a timely manner.
Participate in new information technology projects.
Maintain process documentation for Identity and Access Management activities.
Serve as an escalation resource for the Identity and Access Management team. Cross-train the team in order to backfill and backup peers as needed.
Develop departmental metrics; assist leadership to assure goals are being reached with in group.
Follow ITSM Standards set forth by IT Leadership for incident management, change management, release management, problem management and request management.
Proficient at the on-call process and be able to quickly escalate if needed.
Participate in audits, investigations, providing meaningful evidence.
 
 
Identity and access management (IAM) is the business processes that facilitate the management of electronic or digital identities. The framework includes the organizational policies for managing digital identity as well as the technologies needed to support identity management including all the necessary controls and tools to capture and record user login information, manage user identities and the assignment and removal of access privileges. • Develop and maintain the Identity and Access Management systems and standards. • Perform daily quality checks that IAM systems are performing tasks correctly. • Create, modify, and troubleshoot security access to networks and applications. • Identify, log, and resolve Identity and Access Management tickets. Monitor the status of tickets and advise customers of status in a timely manner. • Participate in new information technology projects.  
Skills: A minimum of three years of relevant security administration experience is required.
Experience in a hospital or healthcare setting is preferred.
Advanced knowledge of IT concepts including: risk, cybersecurity, governance, compliance, operating systems, databases, networking, application and web technologies
Exceptional computer skills utilizing and supporting MS Office and MS Exchange/Outlook
Ability to communicate with all levels of organization and vendors
Ability to develop and follow department policies, standards, procedures and guidelines for Identity and Access Management activities.
Demonstrated skills in project management, teamwork, critical thinking, and continuous process improvement
Maintain a professional level of both written and oral communications. • Maintain process documentation for Identity and Access Management activities. • Serve as an escalation resource for the Identity and Access Management team. Cross-train the team in order to backfill and backup peers as needed. • Develop departmental metrics; assist leadership to assure goals are being reached with in group • Follow ITSM Standards set forth by IT Leadership for incident management, change management, release management, problem management and request management. • Proficient at the on-call process and be able to quickly escalate if needed • Participate in audits, investigations, providing meaningful evidence
Education: Knowledge of computer principles at a level normally acquired through completion of a Bachelor’s degree in a relevant technology field or acquired through a combination of education and experience is required.
More Openings
Epic Analyst - Research
IAM Engineer
Project Manager - Healthcare
Share This Job
Powered by