Senior IAM Systems Support Analyst responsible for deploying and improving IAM services at RBC. Supporting MFA systems and ensuring platform reliability while collaborating with various teams.
Responsibilities
Deploy, support and continuously improve enterprise IAM services, with a focus on authentication systems used for MFA.
Operate and support enterprise IAM and MFA platforms (e.g, RSA, Secret Double Octopus, FIDO2, MFA, SSO), ensuring high availability and performance.
Act as subject matter expert for MFA journeys, including enrollment, recovery, and step‑up authentication across web, mobile, and desktop channels.
Monitor, triage, and resolve IAM and authentication incidents, including on‑call participation for production issues impacting login and access.
Integrate MFA flows with identity providers and directories (e.g., RSA, Entra ID/Azure AD, AD, SWIFT, VPN, Citrix).
Work with application and product teams to onboard new Users and applications to the RSA, including requirements gathering, configuration, and testing.
Implement and maintain authentication and authorization controls in line with corporate security standards, Zero Trust principles, and regulatory requirements.
Perform root‑cause analysis for complex authentication and access issues, documenting findings and implementing preventive measures.
Maintain detailed runbooks, configuration baselines, and operational documentation for IAM and MFA platforms.
Support IAM audits, compliance reviews, and evidence requests related to access controls, authentication policies.
Collaborate with security architecture, SOC, network, and endpoint teams to align detection, logging, and response for identity‑related threats.
Analyze usage metrics and feedback to optimize user experience for RSA authentication manager and other MFA solutions.
Mentor junior analysts and provide technical guidance on IAM tools, support processes, and secure authentication patterns.
Develop and maintain strong relationships with team members, stakeholders, and interface with groups using a variety of techniques.
Requirements
Bachelor’s degree in computer science or equivalent work experience
5+ years in IAM, security operations, or systems support roles with hands‑on responsibility for authentication platforms.
Direct experience supporting or implementing RSA Auth Manager and other strong MFA solutions (FIDO2/WebAuthn, passkeys, authenticator apps, RSA, Okta, Entra ID)
Strong knowledge of IAM concepts: identity lifecycle, RBAC, least privilege, SSO, session management, and privileged access considerations.
Solid understanding of authentication and federation protocols: OIDC, OAuth2, SAML2, and related token flows.
Proven experience supporting Microsoft Entra ID/Azure AD and Active Directory in an enterprise environment.
Strong troubleshooting skills across web, mobile, and endpoint environments, including logs, HTTP flows, certificates, and directory lookups.
Familiarity with security and compliance frameworks (e.g., NIST, ISO 27001, CIS, Zero Trust) and their implications for IAM controls.
Scripting or automation capability (PowerShell, Python, or similar) to streamline IAM operations and reporting.
Excellent communication skills, able to work with developers, security teams, and business stakeholders to translate requirements into technical changes.
Experience working in ITIL processes - incident, problem, and change management processes.
Hands‑on experience with specific MFA vendors (RSA , MS, Secret Double Octopus, Beyond Identity) in production environments (Nice-to-have)
Experience with EIAM & CIAM use cases (large‑scale enterprise, customer or partner identities) and adaptive/risk‑based authentication (Nice-to-have)
Experience with identity governance tools ( PAM, SailPoint) (Nice-to-have)
Familiarity with identity threat detection, behavioral analytics, and fraud prevention capabilities tied into authentication journeys (Nice-to-have)
Knowledge of Zero Trust architecture patterns and device posture integration into access decisions (Nice-to-have)
Background in data analysis or dashboarding (Power BI, Tableau, SQL) for IAM metrics and service health reporting (Nice-to-have)
Security Engineer safeguarding K - 12 student data in several locations for EduTech startup. Designing secure software systems and ensuring data protection to comply with privacy standards.
Security Engineer focusing on data protection and privacy for Kira Learning's educational technology. Safeguarding K - 12 student data while collaborating with engineering teams on secure software development.
Senior Cybersecurity Engineer responsible for protecting Advansys and its clients' IT infrastructure. Designing, implementing, and managing security solutions, while mentoring junior engineers.
Security Engineer responsible for incident response and security protocol design at Sinch. Joining a global team to safeguard sensitive information and enhance cybersecurity measures.
Content Developer creating engaging and effective learning materials for coding education online. Collaborating with a team to develop tailored resources for K - 12 learners in Egypt.
Campus Security Officer ensuring safety at Bright Horizons early childcare centers in Seattle. Responsible for access control, surveillance, and emergency response.
Sounding and Security Watch responsible for Navy asset security at NSF Diego Garcia. Conducting checks and ensuring safety during designated watch hours with strong situational awareness.
Sales Enablement Manager creating technical content for Upwind Security. Collaborating across teams to translate cloud security concepts into clear narratives for engineers and security leaders.
Security Engineer designing and implementing security measures to protect Snap Inc.'s infrastructure. Collaborating across teams while focusing on threat detection and response strategies.
IT Security & Compliance Head at Lonza leading security strategy and managing global risk. Collaboration with senior leadership to enhance information security across Capsules & Health Ingredients business.