Cleveland State University logo

Cleveland State University

Project Analyst Security & Compliance

🇺🇸 Cleveland, OH 🕑 Full-Time 💰 TBD 💻 Compliance 🗓️ March 10th, 2026
CISSP SIEM CISM

Edtech.com's Summary

Cleveland State University is hiring a Project Analyst Security & Compliance. The role involves overseeing the university's Identity and Access Management (IAM) and Identity Management (IDM) systems, ensuring security, integrity, and compliance with access management policies. The position leads cross-functional teams to design and implement identity solutions, collaborates with campus partners, and supports key initiatives to enhance security and governance.

Highlights

  • Oversee CSU's IAM and IDM systems, ensuring alignment with institutional goals.

  • Develop and deliver IAM/IDM security standards, architecture, and best practices.

  • Lead cross-functional teams to design and implement identity solutions.

  • Collaborate with Information Services & Technology (IS&T) and campus partners to support security initiatives.

  • Requires knowledge of data governance standards, privacy laws (GDPR, CCPA, GLBA), and IAM/IDM data architecture.

  • Proficient in communication of security policies to executives, department heads, and end-users.

  • Experience with system security products like Cisco, operating systems Linux and Windows, and SIEM tools such as Splunk preferred.

  • Bachelor’s degree in computer science, IT, business administration, or related field with four years’ experience in data processing, systems analysis, auditing, and project management.

  • Preferred certifications include CISM, CISSP, GIAC or equivalent.

  • Full-time position within the Information Services & Technology department working 40 hours per week.

Project Analyst Security & Compliance Full Description

Cleveland State University
Engaged Learning

Project Analyst Security & Compliance Bookmark this Posting Print Preview | Apply for this Job

Posting Details
Posting Details
Business Title Project Analyst Security & Compliance
Posting Category IT/Technology
Salary Grade 08T
Salary Plan Professional Staff - SEIU
Hiring Range /Pay Rate
Department  Information Services & Technol
Department Description
Position Location Main Campus
FTE 1.0
Job Summary
Oversees Cleveland State Universities (CSU) Identity and Access Management (IAM) and Identity Management (IDM) systems. Responsible for the integrity, security, and compliance of CSU’s access management policies, practices, and processes and ensures all IAM strategies align with CSU’s goals and objectives. Oversees the development and delivery of IAM/IDM security standards, best practices, architecture, and systems to continuously improve identity governance and security across CSU. Leads cross-functional teams to design and implement effective identity solutions and collaborates closely with campus business partners to safeguard sensitive data while optimizing user experience. Serves on various internal and external committees, ensuring collaboration with stakeholders and improved security posture. Collaborates with IS&T and campus partners to evaluate and adopt solutions and methodologies to support key CSU initiatives and improve security. Performs other functionally related duties as assigned.
Minimum Qualifications
  • Bachelor’s degree preferably in computer science, information technology, business administration, or a related field.
  • Four (4) years of experience in a data processing environment including systems analysis, auditing, project management and programming.
  • Experience in IT security in a large-scale, multi-vendor computer environment.
  • Experience in identity and access management including implementation projects in mid-size to larger organizations.
  • Requires occasional evening or weekend work and travel to various organizational locations or vendor sites, as necessary.
Preferred Qualifications
  • Certifications in Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Global Information Assurance Certification (GIAC), or equivalent.
  • Experience with system security-related products, such as Cisco and cybersecurity experience supporting compliance with legal best practices and regulatory compliance for cloud alternatives.
  • Experience with Identity Access Management systems e.g., role-based security, least privilege principle, CIA.
  • Experience in operating systems, such as Linux and Windows and SIEM tools, such as Splunk.
  • Integration strategies across multiple enterprise systems.
  • Knowledge of iterative implementation methodologies, such as agile.
Knowledge, Skills, and Abilities (KSAs)
  • In-depth knowledge of data governance standards, privacy laws e.g., General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), Gramm-Leach-Bliley Act (GLBA), Federal Trade Commission (FTC) Safeguards Rule and IAM/IDM data requirements. Proficiency in establishing policies for data integrity, security, and compliance during and after migration. Capacity to collaborate with IS&T leaders to prioritize data governance measures supporting data security and adherence across the organization.
  • Knowledge of IAM/IDM data architecture, user provisioning, authentication, authorization, and directory services. Capability to oversee data migration, integration, and system administration of the IAM/IDM tool. Ability to display analytical thinking to extract insights from IAM/IDM tool that assists with management of identity governance and architecture.
  • Knowledge of IAM/IDM tool implementation impacts to cross-functional areas e.g., finance, operations, human resources. Proficiency in communicating data governance identity management to executives, department heads, and end-users. Ability to advocate for IAM/IDM initiatives and stakeholder needs.
  • Knowledge of data risks e.g., breaches, migration errors and metrics to measure IAM/IDM successes in the various implementation phases. Ability to mitigate risks through security measures and track organizational impact via KPIs e.g., adoption, accuracy. Ability to safeguard system quality and the ability to assess and communicate IAM and IDM system value to all stakeholders.
Requisition Number PT0703756S
Date grant, position, or appointment expires (For Funds Available, Temporary, and Waiver of Posting
Special Instructions to Applicants
Applicant Instructions
Offer of employment is contingent on satisfactory completion of the University’s verification of credentials and other information required by law and/or University policies or practices, including but not limited to a criminal background check.

 
Applications will be exclusively accepted online at http://www.csuohio.edu/offices/hrd/employment.html. Mailed or emailed application materials will not be accepted.
Hours per week 40
Work Schedule
Advertising Copy
Full Time/Part Time Full Time
Posted Date 01/29/2026
Close Date/Application Deadline
Open Until Filled Yes
Review Begins 02/04/2026
Tentative Start Date
Supplemental Questions

Required fields are indicated with an asterisk (*).

  1. * How did you hear about this employment opportunity?
    • Public Job Posting
    • Internal Job Posting
    • Agency Referral
    • Advertisement/Publication
    • Personal Referral
    • CSU Website
    • Other
  2. If you selected 'Public Job Posting" or "Other" please provide source.

    (Open Ended Question)

  3. * Do you require any type of accommodation, should you be invited to campus for further screening? Please contact CSU at (216) 687-3636 if you need accommodation.
    • Yes
    • No
  4. * Are you able to perform the essential functions of this position with or without reasonable accommodation?
    • Yes
    • No
Application Documents
Required Documents
  1. Resume

Optional Documents

  1. Cover Letter/Letter of Application

To ensure the security of your data, you will be logged out due to inactivity in 3 minutes at
.

Any data not saved will be lost.

Click 'OK' to keep your session active.