We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Senior Identity Management Analyst

University of Texas System
retirement plan
United States, Texas, Austin
210 West 7th Street (Show on map)
Oct 25, 2025
FLSA Status

Exempt

Earliest Start Date

Immediately

Salary

Salary commensurate with experience

Hours per Week

40.00 Standard from 8:00 AM to 5:00 PM

Hiring Department

Office of Information Security

Required Application Materials

A resume and letter of interest is required to apply. Candidates under final consideration will also be required to submit professional references, college degree information, and employment history to an online third-party vendor.

About Us

For more than 140 years, The University of Texas System has improved the lives of Texans - and people all over the world - through education, health care, and research. The System consists of nine academic institutions, four health institutions, and The University of Texas System Administration. The institutions of the UT System employ more than 160,000 faculty, health care professionals, researchers, support staff, and student workers.

The UT System Administration is primarily based in Austin, Texas. It supports the missions of the System's thirteen institutions by providing financial, legal, planning, purchasing, government relations, communications, development, and other central services. Serving a growing state, the UT System Administration strives to provide a welcoming, supportive work environment that embraces different perspectives - not only because it enables the organization to be stronger, creative, and thoughtful, but because it is the right thing to do. To that end, UT System Administration embraces state laws on military and former foster children employment preferences.

Purpose of Position

We are seeking a highly skilled and experienced Identity Management Analyst to join our team. The ideal candidate will be responsible for overseeing the entire identity lifecycle strategy at an enterprise level, ensuring compliance with internal policies and external regulations, and driving the adoption of next-generation IAM approaches. This role requires a deep understanding of IAM architecture, authentication protocols, and identity analytics.

Essential Functions

  • User / Application Access Provisioning & Deprovisioning: Oversee the entire identity lifecycle strategy, design and optimize provisioning/deprovisioning processes, and set standards for account creation, modification, and removal for both regular and privileged users.
  • Identity Governance & Compliance: Define IAM governance frameworks, lead compliance efforts, develop and update IAM policies, and coordinate identity governance processes.
  • Privileged Access Management: Architect and govern the PAM program, select and review the enterprise PAM solution, and establish advanced controls such as just-in-time access for administrators.
  • Security Automation & Scripting: Champion automation and integration efforts, design and roll out enterprise-wide IAM automation, and integrate IAM systems with other IT and security tools.
  • SSO & MFA Management: Direct the architecture and expansion of Single Sign-On and Multi-Factor Authentication solutions, manage federation trust relationships, and ensure robust authentication mechanisms enterprise-wide.
  • IAM System Integrations & API Management: Lead complex IAM integrations, oversee the integration of IAM solutions with cloud services, third-party applications, and internal systems.
  • Incident Response & IAM Security Monitoring: Take ownership of identity-related security incidents, develop and refine incident response plans, actively monitor IAM systems, and respond to security incidents related to identity and access.
  • Emerging IAM Trends: Drive the adoption of next-generation IAM approaches, champion zero-trust security models, and leverage identity analytics and intelligence to analyze user behavior and access patterns.
Knowledge, Skills & Abilities

  • Deep knowledge of authentication protocols and solutions (SAML, Shibboleth, Microsoft EntraID/MIM, DUO, OAuth2/OpenID Connect, Kerberos), Privileged Access Management (PAM), and identity analytics.
  • Familiarity with federated identity systems used for inter-university collaboration and research (such as InCommon federation or Eduroam for campus logins).
  • Capable of evaluating new IAM technologies (e.g., passwordless authentication, identity analytics tools) and integrating them into the organization's strategy.
  • Ability to integrate complex technologies across the IT landscape and align IAM programs with organizational goals.
  • Strong communication and project leadership experience, with the ability to translate business requirements into IAM solutions and articulate risk to management.
Required Qualifications

  • Bachelor's degree in Computer Science, Information Technology, or a related field plus 4 years of IT security related experience or an equivalent combination of education and experience.

In compliance with EO-GA-48 this position requires the ability to maintain the security and integrity of UT System Administration and its infrastructure.

Preferred Qualifications

  • 5+ years of experience in identity and access management, with a proven track record of designing and overseeing enterprise-wide IAM architecture
  • Relevant certifications such as CISSP or recognized industry identity certifications are highly desirable
  • Analysis experience and operational understanding of network equipment, network services, and network/system monitoring tools
  • Analysis experience and operational understanding of one or more major operating systems (Microsoft Windows, Linux, or Mac)
  • Familiar with federal and state regulatory requirements for ensuring information security compliance with applicable laws such as HIPAA, PCI, TAC 202, FERPA, and/or NIST compliance
  • Demonstrated experience in identifying the root cause of an incident and recognize the key elements to investigate to get to the root cause of an incident
  • Experience working with threat intelligence partners and converting it into actionable signatures, detection techniques and policies is preferred
Working Conditions

  • Hybrid work environment (remote & office)
Additional Information

The retirement plan for this position is Teacher Retirement System of Texas (TRS), subject to a minimum of 20 hours per week and at least 135 days in length. Participation in TRS is mandatory.

A background check will be conducted on candidates under final consideration. The background check may include any or all of the following: criminal history check, prior employment verification, education verification, professional references check, and motor vehicle records check. Background checks are conducted by third-party vendors. Upon request form the third-party vendor, candidates under final consideration must provide the required information for the background checks to be completed.

EO/AA Statement

The University of Texas System Administration is committed to providing equal employment opportunity for all qualified applicants and employees in all terms and conditions of employment. U. T. System will provide equal employment opportunity to all qualified persons and will not discriminate on the basis of race, color, sex, sexual orientation, gender identity/expression, pregnancy, religion, national origin, age, disability, genetic information, protected veteran status, or any other characteristic protected by federal or state laws.

For information on accommodations for individuals with disabilities, please contact the Office of Talent and Innovation at oti@utsystem.edu.

Applied = 0

(web-675dddd98f-4tmch)