Junior Security Analyst, Identity & Access Management (IAM)

Job Overview

Location
Bengaluru, Karnataka
Job Type
Full Time
Salary / Compensation
Details Not Provided
Date Posted
6 months ago

Additional Details

Experience
Some Exp. Required (2 - 5 Years)

Job Description

We look for the risk-takers, the collaborators, the inspired, and the inspirational. We want the people who are brave enough to work at the cutting edge and create solutions that will enrich and improve the lives of people across the globe. So, if you want to make the world say wow, let's talk.

The conversation starts here. If this role matches your ambitions and skillset, let's get started with your application. Take a look at our other open positions too. Our many opportunities can lead to infinite possibilities.

Remote Worker - 2nd shift

  • Reporting to the Manager of Identity & Access Management (IAM), the Sr. Security Analyst, IAM will
  • contribute to the global expansion of the IAM program. This position will interface with SIE business units
  • to understand and document their access requirements and propose solutions. The successful candidate
  • will also help to develop operational processes for identity lifecycle management.

Key Responsibilities:

  • Operationally focused on
  • Data Quality - investigate and resolve missing identity attributes
  • Identity lifecycle management (joiner, mover, leaver) - ensure timely removal of access,
  • generate access removal requests tIT, investigate and resolve suspicious account
  • activity, investigate and resolve the status of affiliate user accounts
  • Access Certification - generate access removal requests to ensure timely removal of
  • access
  • IAM Role management
  • Access Requests
  • Collaborate with other analysts to support implementation of a secure IAM framework
  • Assist in the development of new business processes and policies
  • Collaborate on the delivery of multiple IAM-related projects and initiatives in a Scaled Agile
  • environment, ensuring that new functionalities and integrations satisfy the business need
  • Analyze, document, and prioritize complex functional and technical requirements for the new IAM
  • system components via a collaborative process of stakeholder/focus group engagement, data
  • governance decisions, technical design reviews
  • Develop approach and processes to maintain the accuracy of the identity and entitlements
  • warehouse – consuming, organizing, assigning, and reporting on access
  • Plan, configure, communicate, and execute user access reviews to support SOX and PCI
  • audit requirements
  • Support the development of a comprehensive IAM program plan and project plans for the
  • implementation and configuration of new IAM system components on-premise and in the cloud
  • (e.g. Workday, AD, AWS, Azure)
  • Partner with the business to educate and influence decisions to support the IAM program

Qualifications:

  • The ideal candidate will have 0-2 years of experience working within the information security
  • operations and/or identity management disciplines
  • Strong knowledge and experience in cloud technologies (e.g. AWS & Azure IAM)
  • This ideal candidate will have excellent written and oral communication skills, as well as
  • interpersonal skills including the ability to articulate both technical and non-technical
  • audiences. The ideal candidate will be exceptionally self-motivated and organized
  • Experience in creating test plans and developing test cases
  • The successful candidate brings excellent analytical, evaluative, and problem-solving abilities
  • Has extensive knowledge of identity management tools (e.g. Saviynt, RSA, SailPoint, CA,
  • Oracle), technology, RBAC methodologies, policies, and processes
  • Excellent data analysis skills using Microsoft Excel & Access
  • Must have the ability to work independently and multi-task effectively
  • Experience with PCI and SOX programs
  • Good understanding of Directory services (e.g. AD, OpenLDAP)
  • Knowledge of Authentication/Authorization concepts of databases, servers, and applications
  • A bachelor’s degree in Computer Science, IT or Information Security
  • Security industry certifications are a plus

Cookies

This website uses cookies to ensure you get the best experience on our website. Cookie Policy

Accept