Identity Analyst Resume Samples

4.8 (134 votes) for Identity Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the identity analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
EM
E Mraz
Eliseo
Mraz
760 Russel Key
Detroit
MI
+1 (555) 261 8041
760 Russel Key
Detroit
MI
Phone
p +1 (555) 261 8041
Experience Experience
Boston, MA
Identity Analyst
Boston, MA
Kulas-Hoppe
Boston, MA
Identity Analyst
  • Develops, participates and documents standard operating procedures, best practices and technical documentation in a technical repository
  • Perform link analysis and deep-dive analysis
  • Participates in development of features for internal and external applications
  • Analyzing data stores and providing detailed information for entities of interest
  • Assists in the design of enhanced security authorization and authentication models
  • Ensures technical design and implementation complies with established guidelines and standards
  • Provides 24x7 on-call support of production systems on a rotation basis
Dallas, TX
Identity & Access Risk Analyst
Dallas, TX
Padberg Group
Dallas, TX
Identity & Access Risk Analyst
  • Coordinating with global peers across internal and LOB departments, focusing on driving efficiency and service delivery improvements
  • Utilizing existing business intelligence metrics and management reporting
  • Approving recommendations on hiring and staffing decisions
  • Preparing business cases for staffing decisions
  • Developing and maintaining good relationships with business partners
  • Providing leadership during resiliency event as site lead
  • Promoting security awareness across the firm on an on-going basis
present
Philadelphia, PA
Digital Identity Exploitation Forensics Analyst
Philadelphia, PA
Daugherty, Kertzmann and Murazik
present
Philadelphia, PA
Digital Identity Exploitation Forensics Analyst
present
  • They will perform link analysis for identity attributes across NMEC holdings
  • They will also provide input to weekly staff meetings and briefings on exploitation progress
  • The forensic analyst will provide mid-level identity exploitation biometrics focused on DOMEX identity intelligence exploitation and face matching adjudication
  • Will ensure all work is tracked in accordance with the I2 government lead guidelines
  • Analyst will be responsible for producing intelligence reporting and data correlation in support of exporting data to national databases
  • Maintains continuity with partner organizations to ensure data sharing, and awareness of DOMEX policies & guidelines
  • Ensures that SIO and I2 leads are aware of exploitation findings
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Florida Atlantic University
Bachelor’s Degree in Computer Science
Skills Skills
  • Excellent troubleshooting skills and the ability to logically think through problem resolution
  • Knowledge and experience in the architecture and operations of core RESTful and SOAP Web Services
  • SAP knowledge desired
  • Self-motivated, responsible, conscientious, and detail-oriented
  • Excellent verbal and written communication skills
  • Proven ability to provide task estimates
  • Maintaining current knowledge of trends in identity-related technologies and practices
  • Knowledge of associated industry standards and protocols: LDAP, Kerberos, SAML, Oauth/OpenID Connect
  • Good understanding of design/development methodologies
  • Proven ability to manage to priorities and timelines
Create a Resume in Minutes

15 Identity Analyst resume templates

1

Identity & Access Risk Analyst Resume Examples & Samples

  • Analysis and documentation of business requirements and supporting details related to identity and system access administration
  • Development of high-quality, fact-based business cases supporting the continuous enhancement of firm-wide Access Administration processes and tools
  • Project planning and initiation, including scope negotiation with CIB Applications/ Systems as well as Partner Application Development Teams in Corporate Technology
  • Coordination of large Working Groups that typically include Senior Managers from multiple Lines of Business. Serve as Chairperson as required
  • Minimum of 5+ years of Business Analysis or Information Risk Analysis experience
  • Experience with either IT Audit/Controls, Governance or Compliance
  • Ability to partner with multiple business units and control functions to define and document complex business requirements
  • Familiar with data analysis processes and tools. Ability to draw fact-based conclusions from large unstructured data sets
  • Sound trouble-shooting and/or problem-solving techniques. Ability to lead several inter-dependent Technology and Operations teams to arrive at workable solutions
  • Ability to propose reasonable work estimates and document assumptions for system transformation projects (specifically information risk management projects)
  • High level knowledge of component/service based technical architectures and related management challenges
  • Proficiency with MS Excel and PowerPoint is required
  • BS Required. Preferred major in Engineering, Computer Science, and/or Business Information Systems
2

Identity & Access Risk Analyst Resume Examples & Samples

  • Maintaining BAU and drives strategy for request processing and incident management
  • Ensuring Service Level Agreements are satisfied
  • Providing root-cause analysis and process improvement recommendations when service levels are not met
  • Performance management of managers and staff in accordance with corporate guidelines
  • Service delivery and performance of the team as it relates to on-boarding, off-boarding and maintenance of access entitlements
  • Partnering with other functional areas to ensure seamless delivery to customers, including coordination with cross functional or operational resources
  • Implementation of strategic initiatives related to new or enhanced security products and toolsets on supported platforms
  • Assessing recommended procedural changes to enhance the functionality of the operations team
  • Coordinating with global peers across internal and LOB departments, focusing on driving efficiency and service delivery improvements
  • Ensuring appropriate control environment is developed and maintained
  • Ensuring successful implementation of action plans to address risk and control issues
  • Serving as primary point of contact for site specific audit activities
  • Promoting security awareness across the firm on an on-going basis
  • Preparing business cases for staffing decisions
  • Approving recommendations on hiring and staffing decisions
  • Evaluating and execute appropriate staffing plans in order to achieve departmental goals
  • Ensuring that the operating model consists of appropriate levels of resiliency across all responsible locations, documented and tested accordingly
  • Providing leadership during resiliency event as site lead
  • Providing governance and approval for expense related to shift differential and drive overall compensation planning in accordance with HR policies while adhering to budget guidelines
  • Developing and maintaining good relationships with business partners
  • Ensuring communication is customer focused and professional; responsible for local communications
  • Monitoring and ensuring client satisfaction
  • Serving as primary point of contact for site specific escalations
  • 5-7 + years of professional Information Technology experience
  • 3-5 + years experience IT Risk Management
  • 3-5 + years of experience working within a Global Operations capacity
  • Prior internal audit experience is preferred
  • Familiarity with IT risk management framework and control self assessment process
  • Industry recognized certifications (CISA, CISM, CRISC) recommended
  • Bachelor’s Degree preferred; MBA or a masters degree in Risk Management, Operations or similar discipline preferred
3

Senior Identity & Access Analyst Resume Examples & Samples

  • 2+ years work experience functioning as an Analyst in an Identity and Access Management (IAM) position
  • 2+ years of demonstrated experience utilizing Microsoft Office applications including Outlook, Excel, Word and Visio
  • 1+ year of experience identifying and resolving problems with databases and/or data quality
  • 1+ year of experience working with SQL and/or Access databases
  • 6+ months of experience developing policies, procedures and workflow documents
  • 3+ years' experience working in a large, complex, academic medical environment
4

Intermediate Biographic Identity Analyst Resume Examples & Samples

  • Minimum of one (1) year of experience conducting identity, biographic, or biometric analysis
  • Minimum of one (1) year of experience using and creating Structured Query Language (SQL) to include creating/querying tables, joining tables, extracting data across multiple datasets
  • Experience in China AOR knowledge to include Chinese culture and language familiarity
5

Junior Biographic Identity Analyst Resume Examples & Samples

  • Minimum of two (2) years of experience conducting analysis of multiple sources of intelligence information and producing all-source analytic products
  • Advanced knowledge in Structured Query Language (SQL)
  • Familiarity with using and creating Structured Query Language (SQL) to include creating/querying tables, joining tables, extracting data across multiple datasets
6

Junior Biographic Identity Analyst Resume Examples & Samples

  • Minimum of one (1) year of experience conducting analysis of multiple sources of intelligence information and producing all-source analytic products
  • Minimum of one (1) year of experience conducting identity, biographic, or biometric analysis, or targeting experience
  • Basic knowledge of Structured Query Language (SQL) to include creating/querying tables, joining tables, and extracting data across multiple datasets
  • Experience in China or Iran AOR knowledge to include Chinese or Persian culture and language familiarity
7

Mid-level Identity Intelligence Analyst Resume Examples & Samples

  • Provide all necessary PED support for the development and maintenance of a SOF Exploitation Web Application for processing, prioritizing, analyzing, and operationalizing biometrics, forensics, DOMEX, and Weapons Technical Intelligence materials encountered by SOF and its strategic partners
  • Provide support for the management of the Biometrics Enabled Watchlist (BEWL) and/or other future biometrically enabled Watchlist or other watch listing type products which provide a method for operationalizing the output of biometrics and forensics intelligence
  • Provide other i2 products such as RFIs, latent matches, IIRs, weekly BEWL nominations, and POI packages completed
8

Senior Analyst, Identity & Access Mgmt Resume Examples & Samples

  • Collaborates with Infrastructure technical teams to resolve complex IAM security related issues
  • Collaborates with internal stakeholders to build interfaces between applications and IAM tools
  • Designs and implements solutions for securely integrating IAM tools with applicable systems
  • Determines and recommends the most appropriate response to identified complex problems, issues and/or defects by assessing impact and prioritization
  • Determines complex best practices and suggests how to improve current practices
  • Develops cloud solutions for IAM and ensures alignment with business requirements and overall IT strategy
  • Directs the evaluation, selection and design of IAM products and services in-line with industry standards and regulatory compliance
  • Ensures compliance and adherence with corporate security controls and standards as they relate to Identity & Access Management (IAM)
  • Oversees the day to day operations in support of Oracle Identity Manager (OIM)
  • Partners with information security leadership and cross-functional teams to develop strategies and plans to enforce security requirements and address identified risks
  • Provides leadership and direction to vendors for his/her assigned area of responsibility
  • Recognizes and identifies potential areas where existing data security policies and procedures require change and/or creation as well as assists in guiding and training other team members on those policies and procedures
  • Serves as a mentor and shares knowledge with junior and/or peer team members
  • 5 - 7+ Years of experience in IT Security Administration that directly aligns with the specific responsibilities for this position. (Required)
  • 0 - 1+ Years of hands on experience in implementing enterprise level IAM solutions.(Required)
9

Digital Identity Exploitation Forensics Analyst Resume Examples & Samples

  • Analysts will work under the direction of the Sr. Intelligence Officer (SIO) to produce identity intelligence reporting and data correlation under guidelines and procedures established by the I2 and government leads
  • Will ensure all work is tracked in accordance with the I2 government lead guidelines
  • Maintains continuity with partner organizations to ensure data sharing, and awareness of DOMEX policies & guidelines
  • Will routinely interact with interagency partners on products and support services
  • Must have an Active TS/SCI Clearance
  • Support digital forensics activities to include analyzing digital data collected from electronic devices
  • Search through media (files, images, etc.) for relevant information related to security issues and threats
  • Thorough understanding of computer forensics principals & file systems forensics tools
10

Advanced Biographic Identity Analyst Resume Examples & Samples

  • Bachelor's degree from an accredited College or University, or a minimum of four (4) years of experience researching and/or working analytic issues within the IC, U.S. military, commercial industry, or other federal/state/local government agency
  • Minimum of six (6) years of experience conducting analysis of multiple sources of intelligence information and producing all-source analytic products
  • Minimum of six (6) years of experience writing and publishing finished intelligence products
  • Experience using analytic tools and databases
  • Minimum of six (6) years of experience conducting identity, biographic, or biometric analysis
  • Minimum of one (1) year of experience using Structured Query Language (SQL) to include creating/querying databases, joining tables, and extracting data across multiple datasets
  • Experience using GIS applications, Google Earth and/or exploiting georeferenced data
  • Chinese foreign language skills
11

Intermediate Biographic Identity Analyst Resume Examples & Samples

  • Active TS/SCI clearance with Full Scope polygraph - The selected applicants will be subject to a security investigation and must meet eligibility requirements for access to classified information
  • Experience using Sponsor analytic tools and databases
  • Minimum of one (1) year of experieusing Structured Query Language (SQL) to include creating/querying tables, joining tables, and extracting data across multiple datasets
12

Senior Identity & Access Analyst Resume Examples & Samples

  • Analyzing, evaluating and modifying/creating information technology processes, policies, and procedures including accompanying workflow documentation
  • Analyzing, identifying, evaluating, and resolving problems with data quality
  • Analyzing and updating personnel and/or healthcare practitioner data
  • Provisioning access to user accounts in a technology system
  • Designing, developing and implementing workflow automation
13

Identity Analyst Resume Examples & Samples

  • Perform link analysis and deep-dive analysis
  • Writing, editing and reviewing finished intelligence products in multiple formats
  • Researching, coordinating and analyzing a variety of reports from different sources and geographical areas
  • Analyzing data stores and providing detailed information for entities of interest
  • Giving formal presentations and briefings to senior Customers
  • Minimum of 10 years experience in intelligence analysis
  • Minimum of 10 years experience in writing/publishing intelligence products
  • Minimum of 10 years experience with Customer analysis tools and databases
  • Experience with targeting analysis
  • Bachelor's degree from an accredited university or 6 years of intel analysis in the IC
  • Active TS/SCI with customer access
  • Experience with Customer reporting databases, procedures and style
  • Experience across the Intelligence Community
  • Experience with sponsor messaging traffic
  • Experience performing link analysis
  • Experience performing open source research and web-based searches
  • Master's degree from an accredited university
  • Foreign Language skills
  • Identity Intelligence analysis
  • Experience with GIS applications, Google Earth or exploiting geo-referenced data
  • Advanced and thorough knowledge of identity verification, technologies and practices
14

Psta / Senior Identity & Access Analyst Resume Examples & Samples

  • 2+ years professional work experience must include the following
  • 2+ years recent experience in an information technology role focused on identity management, data management or access management. This experience must include at least 2 of the following
  • Project work related to data structure, personnel data, or user access levels
  • 2+ years' work experience functioning as a Senior Analyst (position that includes some type of lead responsibilities) or a Lead in an IAM position
15

Identity & Directories Senior Analyst Resume Examples & Samples

  • Day to day Service Management addressing requests escalated by tier 2 support
  • Be the primary point of contact in the region responsible for responding to all issues
  • Contributes to capacity planning, Metrics & Reporting for AD / DNS / DHCP / PKI / ADFS
  • Be an active resource for the CIP activities and projects agreed for the technology
  • Be the Identity & Directories Security Services advocate for the region
  • Manage the vendor support relationship within the region
  • Knowledge management – Disaster Recovery, change management and process documentation
  • Responsible for legacy RC domain support & strategy for consolidation
  • Contribute to maintaining & improving the Information Security posture for the directory area
  • Support and development of UMRA identity until it’s retired
  • Four plus year university degree (engineering/IT/computer science) or equivalent work
  • 5+ years work experience supporting Microsoft Active Directory , DHCP and DNS
  • Solid understanding of support / change management methodologies
16

Sailpoint Identity IQ Analyst Resume Examples & Samples

  • Installation, integration and deployment of the SailPoint IdentityIQ (IIQ) product
  • Working directly on application / technical problem identification and resolution, including off-shift and weekend support functions
  • 5-7+ years of Java Development experience in an enterprise environment
  • Implementation/Configuration and deployment of the IdentityIQ (IIQ, Identity Access & Identity Management)
  • Experience with the following programming languages: Java, BeanShell/JavaScript, JSP/Servlets, SQL
  • Experience with the following web technologies: XML, SPML/SOAP, Web and Application Servers, HTML
  • Experience setting up and installing software on both Windows and Unix (Linux) platforms
  • Experience with Databases (Oracle/MySQL)
  • Experience with Directories (LDAP, AD, UnboundID)
  • Experience in usability testing, performance testing, automated testing, test scripts, test cases and test plans
  • Familiarity with identity management provisioning systems (CA Identity Minder) is a plus
17

Identity Analyst Resume Examples & Samples

  • Researching, analyzing, and writing intelligence reports in a variety of formats
  • Maintaining current knowledge of trends in identity-related technologies and practices
  • Conveying complex information in a clear, concise manner in both written and oral formats
  • Requires a Bachelor's degree from an accredited university OR additional years of experience in lieu of degree
  • Minimum of 3 years’ experience as an intelligence analyst writing and publishing intelligence products in a variety of formats
  • Minimum of 3 years’ experience with Customer analysis tools and databases
  • Demonstrated research and writing ability
  • Experience with Customer reporting databases, procedures, and style
  • Familiarity with Customer operations and missions
18

Identity Analyst Resume Examples & Samples

  • Designs reusable service components, libraries and frameworks to support Enterprise-level IAM services
  • Participates in development of features for internal and external applications
  • Develops, participates and documents standard operating procedures, best practices and technical documentation in a technical repository
  • Automates and optimizes operational processes as appropriate
  • Provides 24x7 on-call support of production systems on a rotation basis
  • Experience inf Policy expression and checking such as in XACML and WS-Policy
  • Experience with scripting and development (Java, JavaScript, Powershell)
  • Experience with IBM TSPM (Tivoli Security Policy Manager.)
  • Knowledge and experience in the architecture and operations of core RESTful and SOAP Web Services
  • Knowledge of associated industry standards and protocols: LDAP, Kerberos, SAML, Oauth/OpenID Connect
  • 4+ years experience in operating Enterprise-scale Policy Management and Federation Services Infrastructure
  • Direct experience with Federation platforms such as PingAccess, PingFederate, and ADFS
  • Knowledge of associated technologies such as: Windows Server, Active Directory
  • Experience with F5 Platform and associated Identity product modules such as Access Policy Manager (APM)
  • Experience in custom iRule creation, configuration and managementr
  • Proven ability to manage to priorities and timelines
  • Excellent troubleshooting skills and the ability to logically think through problem resolution
  • Self-motivated, responsible, conscientious, and detail-oriented
  • Broad Knowledge in associated Infrastructure services and concepts that rely on networking protocols, authentication mechanisms, encryption methods, and security concepts
  • Design, Build and Deploy experience with an understanding of the following concepts: high availability, load balancing, firewalls, topology models, performance testing, functional testing
  • Understanding of associated technologies such as: LTM, GTM, Big-IP
  • Familiarity with Retail Industry compliance requirements (PCI, SOX, HIPPA)
  • Must be able to work with application teams and assist in implementing and tuning services that are reliable, available and performing
  • Must track and trend metrics for continuous service improvement to include capacity, monitoring, auditing, growth, and maintenance
  • Must be self-motivated, responsible, conscientious, and detail-oriented and possess a passion for
19

Identity Analyst Resume Examples & Samples

  • 4+ years experience in operating Enterprise-scale Policy Management and Services Infrastructure
  • Direct Experience with F5 Platform and associated Identity product modules such as Access Policy Manager (APM)
  • Experience in custom iRule creation, configuration and management
  • Experience with policy tools such as Ping Access Policy Manager
  • Understanding of Policy expression and checking such as in XACML and WS-Policy
  • Experience with scripting and development ( Powershell etc.)
  • Must track and trend metrics for continuous service improvement to include capacity, monitoring , auditing, growth, and maintenance
20

Identity & Access Mgmt Analyst, & Above Resume Examples & Samples

  • Typically Minimum 2 Years Relevant Exp
  • Responsible for the implementation, security, maintenance and access administration of information security managed technologies
  • Must have the ability to pass and maintain a government level security clearance
  • Computer Science, Information Security, Information Assurance, Audit, related technical field and/or the equivalent of training and experience
  • Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Security Essentials Certification (GSEC) or other industry recognized Information Security certification strongly preferred
  • Problem Resolution - Pinpoints potential trouble; seeks, implements standard and alternative solutions to problems
  • Project Management - Plans, organizes, motivates and controls resources to achieve defined goals
21

Analyst, Identity & Access Mgmt Resume Examples & Samples

  • Collaborates and acts as a resource to internal stakeholders on identify and access management requirements by leveraging and applying knowledge of his/her assigned area(s) of responsibility
  • Collaborates with Infrastructure technical teams to resolve more complex IAM security related issues
  • Consults and acts as a resource to vendors for his/her assigned area of responsibility
  • Determines and recommends the most appropriate response to identified more complex problems, issues and/or defects by assessing impact and prioritization
  • Determines more complex best practices and suggests how to improve current practices
  • Ensures the protection of client and company information resources against unauthorized use, inappropriate degrees of access, disclosure, damage and/or loss
  • Partners with information security leadership and cross-functional teams to develop solutions and plans to enforce security requirements and address identified risks
  • Provides evidence for SOX, Financial, and all other audits to internal and external auditors
  • Provides more complex maintenance and support Security Administration tools including but not limited to Dell, Top Secret, CyberArk and Identity and Access Management Systems
  • Serves as a resource to team members to support day to day identity and access management operations
  • 3 - 5+ Years of experience in IT Security Administration that directly aligns with the specific responsibilities for this position.(Required)
22

Analyst, Identity Access Resume Examples & Samples

  • Perform administration (provisioning, de-provisioning, account monitoring, access reviews and authentication support) of the Identity and Access Management lifecycle across all enterprise systems
  • Participate in the deployment of interfaces between the directory, source and target systems
  • Partner with application developers and IT administrators to on-board new applications and systems into the Identity and Access Management platform
  • Actively monitor identity controls and participate in periodic risk assessments to identify compliance issues
  • Collaboration with technology and business partners across functions/processes to ensure alignment, understanding and ongoing communication on Identity and Access Management controls, IT risk management and regulatory/compliance requirements
  • Make recommendations and assist in the implementation of changes to strengthen processes, procedures and compliance resulting in enhanced Identity and Access Management practices
  • 3+ years of experience performing identity lifecycle administration
  • Identity Management experience in one or more of the following areas
  • 1-3 years of experience in Cyber Security
  • Prior experience in a System Administration and/or Application Support role
  • Ability to occasionally work remotely anticipated
23

Identity & Access Analyst Resume Examples & Samples

  • Demonstrated experience utilizing the following Windows based Microsoft Office applications: Access, Excel and Word
  • Demonstrated knowledge and previous experience in identifying and resolving problems with databases and data quality
  • Demonstrated experience utilizing database tools and applications
  • Previous experience working in data analysis and data quality
24

Identity IAM Analyst Resume Examples & Samples

  • Analyze and resolve complex problems in collaboration with others in the business and technology support teams
  • Assess the system/application and remediation activities to prepare the applications, onboarding, and ongoing governance of all systems/applications within the governance tool in accordance with leading practice
  • Utilize deep Identity and Access Governance framework, and extensive technology infrastructure knowledge
  • Solve complex technical and application problems and initiatives in order to make significant, independent decisions when managing the end-to-end processes of the Identity Hygiene team; and,
  • Support member firms, member firms users and their applications that are complex and that are either resolved or require development involvement and potential application updates
  • Diagnose and troubleshoot remediation and risk-based issues
  • Contribute new subject matter on Identity Hygiene practices and knowledge
  • Require considerable communication skills to support and manage effectively the end-to-end processes at a global level
  • Identify and shares key knowledge-sharing opportunities
  • Review and resolve complex application and technology issues relating to Identity Hygiene
  • Manage team responsible for the technical implementation of applications into the Identity Hygiene infrastructure as well as managing the end-to- end process for Identity Hygiene
  • Determine the escalation of support requests to development, if the team is unable to resolve the issue; and,
  • Influence others by leading team and interacting with other IT organizations
  • Identify training gaps and works with peer network and demand organizations to develop training initiatives
  • Provide counseling, coaching and mentoring to staff
  • Take an active role in the coaching and development of US IT Technical Application Support senior associates, identify skill development needs, research and create training to raise skills/core competencies for staff and encourage training and development; and,
  • Deliver value to customers and clients as measured by feedback from key stakeholders
25

Identity & Access Analyst Resume Examples & Samples

  • 1) Strong familiarity within the Office 365 suite including setup and migrations
  • 2) Knowledge of rule based access
  • 3) Knowledge of Multi-factor authentication