×
Register Here to Apply for Jobs or Post Jobs. X

Information Security Analyst

Job in New York, New York County, New York, 10261, USA
Listing for: St. John's University
Full Time position
Listed on 2026-03-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant, Data Security
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Location: New York

Overview

Administrative/Professional → Information Technology

:

Full-Time/Regular

St. John’s, established in 1870, has two New York City campuses; international locations in Rome, Italy;
Limerick, Ireland; and Paris, France; and study abroad locations around the world. The Princeton Review and other top rankings consistently recognize the University’s outstanding academics, diverse student body, dynamic internship, and volunteer opportunities, focus on student life, and diverse study abroad offerings. St. John’s University offers more than 100 undergraduate and graduate programs in its six colleges and schools, with a growing number of programs offered online.

The University is accredited by the Middle States Commission on Higher Education and 12 other major academic and professional associations.

A dedication to diversity, equity and inclusion is at the heart of our mission. As a Catholic and Vincentian university, St. John’s is committed to institutionalizing practices of inclusive excellence to ensure that we welcome and celebrate the intrinsic worth of all members of our community. We will become an even stronger university as we enhance equity at every level of our institution.

Our graduates will excel in the competencies and values needed for leadership and service in a rapidly evolving world.

Job Details

Department: Information Technology

Specific

Job Title:

Information Security Analyst – Identity & Access Mgmt Focus

Reports to: Associate Director, Systems & Security Architect

Job Summary

The Information Security Analyst is responsible for managing the security risk of the University’s data and infrastructure and the user identity ecosystem. The candidate will oversee the implementation of the various security measures and tools, whether outsourced or in-house, and help safeguard technical assets against a cyber-attack. The role is highly collaborative, involving frequent interaction with various members in the IT organization.

In addition to overseeing the implementation of various security measures and tools, the Analyst plays a key role in protecting user credentials, access privileges, and authentication systems, which includes supporting the Identity & Access Management (IAM) platform to ensure proper user provisioning, access governance, and role-based access control (RBAC) across systems.

The role is highly collaborative, involving regular interaction with IT leadership, application owners, and external partners. The Information Security Analyst will monitor security threats, lead vulnerability remediation efforts, and support security operations while also contributing to the development and ongoing maintenance of the IAM lifecycle.

The candidate will participate in any security investigations and incident management drills, helping analyze security-related data from a wide range of security products and devices.

Essential Functions
  • Manage the relationship with outsourced security vendors, including regular review of deliverables related to Identity Services controls and data access.
  • Provide directions to identify, design, and execute security projects that improve detection, response, and access control capabilities.
  • Collaborate with the Identity & Access Management team to ensure role definitions, access reviews, provisioning/deprovisioning processes, and segregation of duties policies are consistently applied.
  • Support IAM lifecycle processes by monitoring and assisting with the automation of user access provisioning, changes, and terminations.
  • Assist with the implementation and administration of IAM solutions, including role mining, entitlement reviews, and access certification campaigns.
  • Run periodic incident response drills and include identity compromise scenarios and credential misuse as part of test planning.
  • Assist with the integration of IAM services with systems such as Active Directory, cloud applications, learning management systems, and enterprise applications.
  • Ensure access governance by monitoring elevated/privileged accounts and supporting the implementation of least privilege policies and just-in-time access where applicable.
  • Review and respond to security alerts related to…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary