We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Security Analyst I

CSX Corporation
United States, Florida, Jacksonville
Aug 22, 2025

Job Summary

The Security Analyst I - Identity supports the organization's identity and access management (IAM) operations. This role focuses on maintaining secure and efficient access to systems and applications, working primarily with IAM platforms such as Okta, Saviynt, and Delinea. The analyst assists in monitoring identity infrastructure health, including Active Directory (AD), IBM Tivoli LDAP, and associated agents and custom application and workflows, ensuring consistent and secure user access across the enterprise.

Primary Duties, Responsibilities and Deliverables

  • Document identity management processes and contribute to continuous improvement initiatives.
  • Participate in audits and reporting related to identity systems and access controls.
  • Ensure compliance with security policies and procedures related to identity and access management.
  • Collaborate with senior analysts to troubleshoot and resolve identity-related issues.
  • Monitor and maintain the health of identity infrastructure components such as Active Directory (AD), IBM Tivoli LDAP, and associated agents for Okta, Delinea, and Saviynt.
  • Support user provisioning, de-provisioning, and access reviews using IAM tools.
  • Assist in managing identity and access management (IAM) systems including Okta, Saviynt, and Delinea.

General Knowledge and Skills

Technical Skills

  • Identity and Access Management (IAM): Basic understanding of IAM principles, including provisioning, de-provisioning, and access reviews.
  • Okta Administration: Familiarity with user lifecycle management, SSO configuration, and MFA policies.
  • Saviynt: Exposure to access governance, role-based access control, and compliance reporting.
  • Delinea (formerly Thycotic): Understanding of privileged access management (PAM) and vault operations.
  • Active Directory (AD): Experience with user/group management, GPOs, and directory health monitoring.
  • LDAP (IBM Tivoli LDAP): Basic knowledge of directory queries, schema, and replication.
  • Agent Monitoring: Ability to check and troubleshoot IAM agents for Okta, Saviynt, and Delinea.
  • Scripting: Basic PowerShell or Python for automation and reporting tasks.

Security & Compliance

  • Access Control Policies: Understanding of least privilege, segregation of duties, and role-based access.
  • Audit & Compliance Support: Ability to assist with identity-related audits and generate access reports.
  • Incident Response: Basic skills in identifying and escalating identity-related security incidents.

Operational & Analytical Skills

  • Troubleshooting: Ability to diagnose and resolve identity-related issues.
  • Documentation: Skill in maintaining process documentation and runbooks.
  • Monitoring Tools: Familiarity with dashboards and alerts for IAM and infrastructure health.
  • Data Analysis: Ability to interpret logs and access data for anomalies or trends.

Soft Skills

  • Communication: Clear and professional interaction with IT teams and end users.
  • Collaboration: Team-oriented mindset, especially when working with senior analysts or cross-functional teams.
  • Attention to Detail: Precision in managing access rights and documenting changes.
  • Adaptability: Willingness to learn new tools and respond to evolving security needs.

Minimum Qualifications

  • Bachelor's Degree/4-year Degree in information Technology or other Technical degree
  • 3or more years of combined IT and security work experience with extensive exposure conducting network security vulnerability assessments, penetration testing, or other related experience using advanced networking tools and security solutions as well as non-traditional techniques and methodologies and at least two (2) or more years of experience intelligence collection, analysis, and reporting process/procedures or two (2) or more years of experience in bug bounty programs, security research.

Job Requirements

  • Work hours may vary in length and schedule (may include a non-standard work week)
Applied = 0

(web-5cf844c5d-d7k5c)