Identity & Access Management; IAM Analyst
Listed on 2026-01-15
-
IT/Tech
Cybersecurity, IT Consultant, Information Security
ongan Department Summary
The UCLA Information Security Office enables UCLA’s goals by providing leadership that assures the confidentiality, integrity, and availability of its information resourcesорк. It enhances incident response planning and notification procedures and implements ভাষ risk assessment strategies to identify vulnerabilities and threats across departmental and enterprise systems. The office enacts a comprehensive IT security plan, proposing, delivering, and enforcing administrative, technical, and physical security measures to mitigate identified risks based on their sensitivity or criticality.
Identity and Access Management (IAM) safeguards resources and supports university business through account lifecycle, authentication, access, and role‐based provisioning at the enterprise level, ensuring rigorous entitlements regulation and auditing of all identities managed by UCLA.
The Identity & Access Management (IAM) Analyst will lead the design, implementation, and support of advanced IAM data, processes, and technologies. The analyst will collaborate with university departments and external vendors to ensure quality identity data, establish data standards, and grant appropriate access levels to users in a timely, secure, and compliant manner, emphasizing automation where possible. The role will also evaluate and test new software and upgrades, produce documentation, procedures, and any necessary materials to support introduce IAM services.
The analyst will protect university stakeholders’ information and data in service of the institution’s academic and research mission, delivering exceptional IAM service consistently across faculty, staff, students, and other persons of interest, while modeling UCLA’s culture and values.
UCLA provides a full pay range. Actual salary offers consider factors including budget, prior experience, skills, knowledge, abilities, education, licensure, certifications, and other business considerations. Salary offers at the top of the range are not common. Visit UC Benefit package to discover benefits that start on day one, and UC Total Compensation Estimator to calculate the total compensation value with benefits.
- Three years of experience in computer science, cybersecurity, computer information systems, or related field. (Required)
- Experience using identity and access tools and systems in a distributed IT environment. (Required)
- Experience with IAM monitoring tools and analyzing logs for anomalous user behavior. (Required)
- Experience advancing an inclusive environment that values equity, diversity, inclusion and belonging. (Required)
- Five or more years of experience in computer science, cybersecurity, computer information systems, etc. (Preferred)
- Experience in complex higher education environments, serving academic and administrative functions of a large public university. (Preferred)
- Demonstrated skills applying secure user authentication and account management standards to computer software and hardware. (Required)
- Strong knowledge of IAM principles, technologies, and best practices, including experience with RBAC and IGA, and privileged access management (PAM). (Required)
- Familiarity with directory services (e.g., Active Directory, LDAP), authentication (e.g., SSO), and multi‑factor authentication (MFA) solutions. (Required)
- Strong written and verbal communication skills and ability to communicate technical information to a diverse community of colleagues and stakeholders. (Required)
- Ability to establish and advance positive working relationships and rapport with team members, stakeholders, and customers. (Required)
- Strong organizational skills and ability to balance competing priorities and support concurrent projects, using leading project management practices including schedule management, status reporting, and communication of project risks and issues. (Required)
- Strong demonstrated problem‑solving skills; scope solutions based on available resources and timelines; ask questions, gather information, evaluate options, and make decisions with integrity. (Required)
- Creative thinker who proposes innovative ideas, incorporating new technologies or…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).