Business Title | Project Analyst Security & Compliance
Posting Category | IT/Technology
Salary Grade | 08T
Salary Plan | Professional Staff - SEIU
Hiring Range /Pay Rate |
Department | Information Services & Technol
Department Description |
Position Location | Main Campus
FTE | 1.0
Job Summary Oversees Cleveland State Universities (CSU) Identity and Access Management (IAM) and Identity Management (IDM) systems. Responsible for the integrity, security, and compliance of CSU’s access management policies, practices, and processes and ensures all IAM strategies align with CSU’s goals and objectives. Oversees the development and delivery of IAM/IDM security standards, best practices, architecture, and systems to continuously improve identity governance and security across CSU. Leads cross-functional teams to design and implement effective identity solutions and collaborates closely with campus business partners to safeguard sensitive data while optimizing user experience. Serves on various internal and external committees, ensuring collaboration with stakeholders and improved security posture. Collaborates with IS&T and campus partners to evaluate and adopt solutions and methodologies to support key CSU initiatives and improve security. Performs other functionally related duties as assigned.
Minimum Qualifications | Bachelor’s degree preferably in computer science, information technology, business administration, or a related field. Four (4) years of experience in a data processing environment including systems analysis, auditing, project management and programming. Experience in IT security in a large-scale, multi-vendor computer environment. Experience in identity and access management including implementation projects in mid-size to larger organizations. Requires occasional evening or weekend work and travel to various organizational locations or vendor sites, as necessary.
Preferred Qualifications | Certifications in Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC), or equivalent. Experience with system security-related products, such as Cisco and cybersecurity experience supporting compliance with legal best practices and regulatory compliance for cloud alternatives. Experience with Identity Access Management systems e.g., role-based security, least privilege principle, CIA. Experience in operating systems, such as Linux and Windows and SIEM tools, such as Splunk. Integration strategies across multiple enterprise systems. Knowledge of iterative implementation methodologies, such as agile.
Knowledge, Skills, and Abilities (KSAs) | In-depth knowledge of data governance standards, privacy laws e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Gramm-Leach-Bliley Act (GLBA), Federal Trade Commission (FTC) Safeguards Rule and IAM/IDM data requirements. Proficiency in establishing policies for data integrity, security, and compliance during and after migration. Capacity to collaborate with IS&T leaders to prioritize data governance measures supporting data security and adherence across the organization. Knowledge of IAM/IDM data architecture, user provisioning, authentication, authorization, and directory services. Capability to oversee data migration, integration, and system administration of the IAM/IDM tool. Ability to display analytical thinking to extract insights from IAM/IDM tool that assists with management of identity governance and architecture. Knowledge of IAM/IDM tool implementation impacts to cross-functional areas e.g., finance, operations, human resources. Proficiency in communicating data governance identity management to executives, department heads, and end-users. Ability to advocate for IAM/IDM initiatives and stakeholder needs. Knowledge of data risks e.g., breaches, migration errors and metrics to measure IAM/IDM successes in the various implementation phases. Ability to mitigate risks through security measures and track organizational impact via KPIs e.g., adoption, accuracy. Ability to safeguard system quality and the ability to assess and communicate IAM and IDM system value to all stakeholders.
Requisition Number | PT0703756S
Date grant, position, or appointment expires (For Funds Available, Temporary, and Waiver of Posting |
Special Instructions to Applicants |
Applicant Instructions | Offer of employment is contingent on satisfactory completion of the University’s verification of credentials and other information required by law and/or University policies or practices, including but not limited to a criminal background check.
Applications will be exclusively accepted online at
http://www.csuohio.edu/offices/hrd/employment.html. Mailed or emailed application materials will not be accepted.
Hours per week | 40
Work Schedule |
Advertising Copy |
Full Time/Part Time | Full Time
Posted Date | 01/29/2026
Close Date/Application Deadline |
Open Until Filled | Yes
Review Begins | 02/04/2026
Tentative Start Date |
Required fields are indicated with an asterisk (*).