Previous Job
Access Control Specialist
Ref No.: 17-01985
Location: Fort Worth, Texas
Position Type:Direct Placement
Start Date: 11/02/2017
The Access Control Coordinator is responsible for processing user access requests, ensuring integrity/accuracy of identity data and requiring access to be removed when individuals leave an organization or change job functions through the use of Identity Management tools and software.
  • The Access Control Coordinator is responsible for process improvement activities of access administration processes and will create and maintain provisioning processes including on-boarding, off-boarding, role management, attestation, report generation and compliance processes. The associate will execute manual processes for monitoring and auditing user access by gathering information from system administrators in systems outside the Identity Management Solution. The Coordinator will be responsible for communication, escalation and timely resolution of any access and permission discrepancies identified through periodic monitoring and auditing activities.
  • The Access Control Coordinator participates in projects and works directly with business units to provide requirements on the implementation of access controls and administration procedures. The Access Control Coordinator is responsible for the creating of process improvement and process documentation.
  • The Access Control Coordinator participates in the evaluation and development of security policies and procedures. This associate will assist Security Risk Management in helping to develop and implement security procedures, to ensure a secure computing environment for the company.

  1. Fulfillment of Access related Service Requests according to standard operating procedures and service level commitments.
  2. Network Account Provisioning utilizing standard industry tools such as Active Directory to set up and maintain user network access during the associate life cycle.
  3. Email mailbox and distribution list provisioning utilizing standard industry tools such as the Microsoft Exchange Management Console.
  4. Work with business units to define role-based access controls (RBAC), ensure appropriate segregation of duties with applications and compliance with Identity Management processes.
  5. Fulfillment of Access Service Requests for account modifications for 3rd party vendors.
  6. Provisioning of remote access using RSA SecurID.
  7. Manage the disbursement of the VPN tokens utilizing physical, laptop, and mobile devices.
  8. Serve as a subject matter expert on specific applications, permissions and access.
  9. Responsible for the creation of process improvement and process documentation.
  10. Participate in and lead an across team / interdepartmental collaboration identifying opportunities to improve the associate computing experience with end-user technologies.
  11. Responsibly utilizes privileged access to execute job functions in accordance with policies and procedures.
  12. Provides mentoring to team members and consults with peers across IT and the business.
  13. Provide confidential support to Human Resources in times of associate employment changes including termination, layoffs, and resignations in which primary access will be disabled to prevent unauthorized access to the network or access to internal systems.
  14. Provide immediate support, troubleshooting, repair or replacement of RSA Device Tokens for Mobile Devices in the event of Disaster, Emergency, Travel, or Work from home which enables the associate to access to the network and support the business in a time of need.
  15. Provide immediate provisioning support to the business for instances deemed high priority while following designed workflow process to ensure proper procedures are followed for Compliance and Auditing purposes.
  16. Provide second tier technical support for end user systems and products for internal associates of all organizational levels.
  17. Contributing to the team in identifying opportunities for Process Improvement and Incident Reduction.
  18. Responsible for Incident resolution for Access Control related issues within agreed upon Service Levels.
  19. Support, troubleshoot and remediate issues with internal applications
  20. The role requires 24/7 on-call support as well as scheduling and attendance for unexpected events
  21. Lead Access Control efforts for small projects or internal initiatives.
  22. Design, implement and report on system and end-user activity audits.
  23. Lead Access Control efforts for small projects or internal initiatives.
  24. Interface with internal and external client auditors as it pertains to the effectiveness of IT security control environment.
  25. Assists with the resolution of audit findings related to user account management.
  26. Participate and provide documentation for the Internal Controls Assessment Program.
  27. Protects organization's value by keeping information confidential.
  28. Review and recommend new security policies and procedures based on new technology.
  29. Review Information on new technology to recommend better security updates.
  1. Strong written and verbal communication skills.
  2. Excellent people skills with the ability to handle difficult situations.
  3. Excellent time management and organizational skills.
  4. Ability to multitask and prioritize.
  5. Familiarity with Request and Incident ticketing systems (Remedy, GIRA).
  6. Strong Troubleshooting capabilities evidenced by organized, analytical thinking.
  7. Keen attention to detail, with a commitment to follow through and follow-up.
  8. Must be able to communicate effectively with technology, business, management and executive management.
  9. Acquire and maintain current knowledge of relevant products offerings and support policies in order to provide a technically accurate solution to associates and team members.
  10. Support organizational changes from a provisioning perspective with ongoing maintenance support
  11. Exhibiting leadership qualities by taking the initiative to identify and resolve issues
  12. Identify opportunities to improve department
  13. Demonstrate advanced understanding of business processes, IT controls and related standards
  14. Strong Understanding of Active Directory administration.
  15. Strong understanding of Microsoft Exchange administration.
  16. Critical thinking, analytical, and project management skills
  17. Military education or experience may be considered in lieu of civilian requirements listed