Returning Candidate?



Requisition ID 
Information Technology

Company Overview

At Dollar General, our customer is at the center of everything we do! We are a fast-moving Fortune 200 publicly-traded company with more than 14,000 stores and 14 distribution centers in 44 states, growing by hundreds of stores each year. We work in an energetic atmosphere that embraces innovation and teamwork. At Dollar General, you can see a clear and fast path to career growth and success. We are committed to attracting talented and motivated people who can advance our mission of "Serving Others." Let's Grow Together!

Job Details

Job Title: IT Security Administration Senior Analyst
Department: IT Security
Reports To: IT Security Administration Manager
Supervises: N/A


General Summary: 

Responsible for administration and execution of identity and access management program processes, access certification processes, regulatory compliance support, access monitoring and analysis, policy compliance support, and other related information security administration functions. Recommends, designs, implements, and administers information security controls that meet dynamic tactical and strategic information security objectives.


Duties & Responsibilities:

  • Supports defined company operating principles via effective, pragmatic information security access management controls implementation and administration.
  • Performs access-oriented security risk and compliance reviews.
  • Collaborates with information security management to identify, recommend, and develop access management risk remediation plans, track remediation outcomes and timelines, etc.
  • Represents information security via pragmatic consultation and participation in a defined SDLC.
  • Promotes security best practices via awareness, leadership by example, and compliance with policies and applicable legal and regulatory requirements.
  • Supports internal and external auditors through effective and timely execution of audit deliverable requests and maintaining audit readiness for access management processes.
  • Assists information security management in the development of management audit responses.


Knowledge, Skills, and Abilities: 

  • Strong understanding of current and developing information security administration technologies and trends.
  • Strong understanding of role-based access management (RBAM) methodologies, controls, and practices.
  • Strong, effective written and oral communications skills for multiple audiences
  • Strong negotiation skills (e.g., internal security recommendations, external vendor coordination)
  • Strong understanding of pragmatic information security access controls; access management strategies; access risk and compliance management techniques; and PCI, HIPAA, and SOX regulatory requirements.
  • Ability to learn and retain new technical and non-technical skills in order to adapt to an evolving risk climate and business environment.
  • Ability to work occasionally during non-standard shifts, in an on-call capacity, and able to travel occasionally (up to 25%).


Work Experience and/or Education: 

  • College degree in information security or computer information systems plus five years information security administration experience, or equivalent combination, required.
  • Strong, hands-on experience coordinating with business and IT teams to analyze business processes to define business and risk appropriate roles, documenting or assisting in the documentation of role management procedures, implementing or assisting with implementation of defined roles, and managing defined roles in accordance with procedures.
  • Strong, hands-on experience identifying and facilitating the remediation of security risks associated with potentially unauthorized, stale, unused, excessive, or other unnecessary access.
  • Hands-on experience with various security administration technologies (e.g., identity and access management platforms; Microsoft Active Directory and OpenLDAP directory services; various access management interfaces [e.g., Dell Active Server Roles; Pulse Secure SSL VPN; Microsoft Windows, IBM AS/400, IBM AIX, and Linux; Microsoft SQL Server and Oracle; and SaaS applications]; RSA SecurID token management; SIEM security event log review technologies; Symantec Data Loss Prevention; Microsoft Excel, Outlook, Power BI, PowerPoint, SharePoint, Visio, and Word; and T-SQL database query syntax).



Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.