.purpose statement:the cybersecurity operations analyst supports plexus' overall cybersecurity strategy by defining and implementing access management controls, concepts, and best practices to reduce cybersecurity risk while collaborating with global teams to enable strategic business initiatives. The cybersecurity operations analyst supports the implementation of identity and access management, privilege access management, single sign-on, and/or multi-factor authentication, best practices. The cybersecurity operations analyst will propose secure design principals through a solid understanding of access management concepts, cybersecurity best practices such as privilege access management, principle of least privilege, the iam lifecycle, and role-based access control models.key job accountabilities:- configure access management software, implementing iam administration functions across multiple operating systems and hardware platforms.- minimize customization and promote out-of-the-box or standards based solutions whenever possible.- partner with global teams to enable strategic business initiatives while aligning with iam best practices.- support and maintain the integration of adfs, sso, pam, or multi-factor technologies into plexus technology stack.- maintain pki technology and certificate management solutions.- solve complex technical challenges in critical situations that require immediate resolution.- work closely with support teams, systems and business analysts to promote technical and functional upgrades, enhancements and best practices/industry standardsadditional accountabilities:- maintain strong technical knowledge of up-to-date technology systems, software, protocols, and standards.- evaluate and recommend different iam technology solutions based on business needs, requirements, and use cases- develop and implement appropriate iam security policies and procedures.- establish and maintain effective relationships across departments, business areas, and vendors.- additional duties as required.education/experience qualifications:- a minimum of a _bachelor's degree_ is required; a _bachelor's degree init or cybersecurity related field _is preferred.- _ five (5) or more _years of related experience is required.- an equivalent combination of education and experience sufficient to successfully perform the key job accountabilities may be considered.other qualifications:- understanding of sso protocols (saml, ws-fed, openid, oauth) and iam concepts such as attestation, provisioning, sso, rbac, sod policies, federation, etc.- knowledge and experience with idaas providers such as microsoft, okta, ping identity, google cloud identity- experience with cloud architectures particularly azure and aws iam controls.- well versed in identity governance processes and solutions- knowledge of applied cryptography, pki, and certificate management.- ability to multi-task and participate in multiple large and complex efforts or projects