Identity and Access Management Administrator II
Colorado Springs, CO, United States
The Identity & Access Management team is responsible for how users within an organization are given an identity, and how it is protected, which includes securing critical applications, data, and systems from unauthorized access while managing the identities and access rights of people both inside and outside the organization.
Identity & Access Management involves protecting data assets and implementing processes, tools and standards to run business intelligently. The team is heavily involved in the Audit & Regulatory Compliance area.
The IAM Administrator II will be responsible for access management for state applications, systems and resources while ensuring compliance. This position is responsible for doing research and analysis for possible duplicate accounts. Responsible for going into the back end of the IAM Identity Manager system to perform daily tasks. Support development team with ticket backlog for accounts that need further verification, have incorrect data, and/or need to be transferred to different agencies. It is the responsibility of the IAM Administrator to manage identity and access across state systems by providing the right person, the right access at the right time. Ensure compliance with internal policies, support team standards, security, and regulatory requirements related to identity management.
Location Requirements
Candidate must be local.
Candidate Must Be Local
Additional Location Details (City, State) :
Information Security Training
Information on Security Training
NOTICE: If you are hired as vendor staff who will have access to state systems or data or as a contractor for one of the state executive branch consolidated agencies, in adherence to Colorado Revised Statute § 24-37.5-401, 403, 404, 405, and 406, and Colorado Information Security Policy (CISP) 002, you will be required to self-register and complete information security training, including but not limited to review and acknowledgement of the Acceptable Use of State Data and IT Resource Policy (AUP) (CISP-018), through the consolidated agency contractor information security training site within 30 days of your contract start date and annually thereafter. Should you be awarded this contract, the state agency will provide the contractor information security training site information to you.
Background Verification
Minimum Verification Requirements
Please complete the following verifications with Info Cubic upon candidate's selection. Additional verifications may be identified by the agency.
State Criminal Record verification (past 7 years covering each State in which the candidate has resided)
County Criminal Records (past 7 Year Address History)
Federal Criminal Records Verification (past 7 years)
SSN Name Search
Global Monitor Check (formerly Patriot/OFAC/Terrorist)
(Suppliers Only)
To order, click on the link to the right:
Order the OIT Background Verification
Type Category Qualification Description Competency Required
Indotronix is an Equal Opportunity Employer