• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Jobs » Senior Cybersecurity Analyst – QVC

Senior Cybersecurity Analyst – QVC

2020-08-14 by Geo

QVC

Company Location: West Chester, PA, US

Seniority Level: Mid-Senior level

Industry:

  • Logistics & Supply Chain
  • Retail
  • Financial Services

Employment Type: Full-time

Job Functions:

  • Information Technology
  • Engineering

As the world’s leading video and ecommerce retailer, QVC has a history of growth and success that goes unmatched. We are an $8.8 billion business that reaches over 370 million homes worldwide. QVC continues to grow on-line, on-air, and through mobile. Ranked as the #3 largest mobile commerce player among multi-category retailers and with nearly 3 million downloads for QVC apps for iPhone and iPad in US, UK and Germany, our global IT organization is expanding and we are in search of tech talent to join our high performing team. We are an innovative, technology-driven company that embraces corporate responsibility and is committed to our people. US Headquarters are located just outside of Philadelphia in West Chester, PA.
You have a lot to consider when choosing an employer. It’s not just us interviewing you; it’s you taking a good look at us. To attract, motivate, and retain the best talent, we offer a best-in-class benefits package that considers all the facets of your life: money, career trajectory, health and well-being, and quality of life. We think you’ll like what you see here.

Job Description Details

The Senior Cybersecurity Analyst, IAM will be responsible for operational support for technologies within Qurate’s global Identity & Access Management (IAM) program, including Identity Governance & Administration (IGA), Privileged Access Management (PAM), and Access Control tools. Under limited oversight by the IAM Operations manager, this individual will execute regular operational processes, support and maintain IAM tools, monitor system health and respond to alerts and incidents, and provide support for projects and initiatives that interface with IAM. The Senior Analyst will also provide general oversight and guidance to more junior staff members and ensure quality and consistency within supported areas.

IAM Tools Operational Support

  • Daily monitoring of IAM tool health and remediation of common issues
  • Configuration and maintenance of provisioning roles and rules within the SailPoint solution (medium to high complexity)
  • Configuration and maintenance of CyberArk safes and permissions (medium to high complexity)
  • Configuration and maintenance of Centrify permission and policies (medium to high complexity)
  • Periodic metrics generation, and creation of metrics to measure the performance of tools and operational processes
  • Analyze tool/process performance, identify process improvement opportunities, and make recommendations to IAM Operations Manager
  • Creation of recurring and ad hoc IAM related reporting as needed
  • Periodic on-call support for IAM tools
  • Oversight of tasks performed by more junior team members, providing feedback and guidance as needed

Change and Incident Management Support

  • Regular monitoring of incidents and changes within the IAM Operations queue
  • Execution of production deployments for IAM tools
  • Execution of change tasks in support of other IT teams
  • Troubleshooting and resolution for medium to high complexity incidents
  • Perform root cause analysis for recurring issues, incorporating feedback from more junior team members, and work with IAM Engineering team to implement strategic fixes
LinkedIn Apply
Apply on LinkedIn

Project Support

  • Represent IAM Operations in medium to high complexity projects as needed
  • Provide consulting to project teams around IAM technologies and processes
  • Define IAM project tasks and dependencies, and support the execution of tasks according to the project plan

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Get 90% Off Ivacy VPN! (ad)

IVacy VPN

WHAT TO SHOP NOW

Shop

Safeguard Your Money with a VPN

Beat the Stock Market! - Get Rule Breakers!

Malwarebytes Anti-Virus is On Sale!

Shop Kaspersky Anti-Virus

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Airplane Manufacturer Hit by Data Breach

Google Impersonation Scam Steals Passwords

IRS Warns of Tax ID Number Scam

Senior Associate, Information Security Operations

SolarWinds May Shape Cyber Policy: Saturday Sitrep

Categories

Cyber Security News

Airplane Manufacturer Hit by Data Breach

… [Read More...] about Airplane Manufacturer Hit by Data Breach

Google Impersonation Scam Steals Passwords

… [Read More...] about Google Impersonation Scam Steals Passwords

Netherlands Police Post Warnings to Would-be Hackers

… [Read More...] about Netherlands Police Post Warnings to Would-be Hackers

Kia Motors Hit by Ransomware Attack

… [Read More...] about Kia Motors Hit by Ransomware Attack

More Cyber Security News

Tags

amazon Android app Apple bitcoin China chrome CISA credit card Cyber Attack DHS Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware Romance Scam Russia smartphone tax scam TikTok tutorial VPN WhatsApp WiFi Windows

Government

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

Texas DOT Hit by Ransomware Attack

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2021 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version