×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Cybersecurity IAM Federation Analyst

Job in East Peoria, Tazewell County, Illinois, 61611, USA
Listing for: Caterpillar
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

Career Area:
Technology, Digital and Data

Job Description: Your Work Shapes the World at Caterpillar Inc. When you join Caterpillar, you’re joining a global team who cares not just about the work we do — but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don’t just talk about progress and innovation here — we make it happen, with our customers, where we work and live.

Together, we are building a better world, so we can all enjoy living in it.

Cybersecurity IAM Federation Analyst

Role Definition:
The IAM Federation analyst will support the Federation services within the Identity and Access Management (IAM) organization of Caterpillar Cybersecurity. This analyst will support the ongoing use of Ping Access as well as the migration from Ping Federation to Entra  IAM Federation analyst will have a deep understanding of the Ping Federation and Ping Access technologies. Ideally the incumbent will also have a knowledge of Entra  role will support Caterpillar segments and user base to understand business needs and how the service can help meet those needs.

Strategic initiatives will include the migration of applications and APIs from legacy technology to Entra  authentication and federation services.

What You Will Do
  • Support and maintain Caterpillar's Ping Access instance and the applications using this service
  • Act as the technical expert for Ping Access
  • Support the migration of applications from Ping Federate to Entra
  • Support and maintain SSO connections within EntraID
  • Develop robust user reporting and ownership tracking for Ping Access
  • Create communication and documentation for end users
  • Develop support documentation and processes for level 1 and 2 support teams
  • Support project teams on priority initiatives such as:
    • New application onboarding
    • Migration of existing applications & APIs to Entra
    • Credential creation and rotation automation
What You Have
  • Hands on experience with Ping Identity and Ping Access.
  • Extensive experience with authentication protocols such as oAuth or SAML.
  • Strong technical understanding of Ping Access and Ping Federation
  • Strong technical understanding of Microsoft Entra  & Microsoft Azure B2C
  • Power Shell & Graph API knowledge
  • Accredited, four-year Information Technology degree, a closely related technical degree, or equivalent experience.
  • Strong writing, communication, and presentation skills; ability to deliver messages to technical and non-technical audiences.
  • Ability to balance customer experience and IT risk.
  • High Level of customer focus with professional communication skills.
  • Self-starter with strong technical skills and business acumen.
  • Ability to think broadly and strategically balanced with high attention to detail.
  • Excellent organizing, time management, and priority setting skills.
  • Effective relationship building and influencing skills.
  • Strong analytical and problem-solving skills.
Consulting
  • Knowledge of techniques, roles, and responsibilities in providing technical or business guidance to clients, both internal and external; ability to apply consulting knowledge appropriately.
Cybersecurity Standards and Policies
  • Knowledge of developing cybersecurity policies, standards, and procedures; ability to develop and communicate policies, standards and procedures that guide interactions with customers.
Cybersecurity Risk Management
  • Knowledge of tools, techniques, approaches, and processes of cybersecurity risk management; ability to ensure organizational network operation and minimize negative effect by cybersecurity risks.
Information Security Management
  • Knowledge of the processes, tools, and techniques of information security management; ability to deploy and monitor information security systems, while detecting, controlling and preventing violations of IT security.
Information Technology (IT) Security Policies
  • Knowledge of IT security policies, standards, and procedures; ability to utilize a variety of administrative skill sets and technical knowledge to ensure cyber security compliance.
Requirements Analysis
  • Knowledge of tools, methods, and techniques of requirement analysis; ability to elicit, analyze and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary