0% found this document useful (0 votes)
23 views2 pages

A JD Access MGMT

The document describes a job posting for an Identity and Access Management Analyst role. The role involves managing user accounts and permissions, ensuring appropriate access to resources, troubleshooting IAM issues, and maintaining IAM systems, policies, and best practices in accordance with organizational needs.

Uploaded by

Mona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views2 pages

A JD Access MGMT

The document describes a job posting for an Identity and Access Management Analyst role. The role involves managing user accounts and permissions, ensuring appropriate access to resources, troubleshooting IAM issues, and maintaining IAM systems, policies, and best practices in accordance with organizational needs.

Uploaded by

Mona
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

In Advanced, we develop and host multiple software products and manage a large technical

infrastructure across Public Cloud, Private Cloud and on-premise data centres.
We are seeking an experienced IAM Analyst to join our team.

As an Identity and Access Management Analyst working within the Information & Cyber
Security function, you will pay a critical role in ensuring the protection of Advance’s
information systems and data. You will work closely with various departments within the
organisation to help drive access control initiatives in support of internal policies, regulatory
compliance, and industry standards.
This includes providing IAM expertise and guidance as well as technical implementation of
access controls across all platforms.
What you will do:


o Managing user accounts and permissions in the identity and access
management system.
o Work closely with the IAM team to ensure that the right people have access to
the right resources e.g., this may involve granting or denying requests to
organisation resources based on user role (identity) and privileges.
o Responsible for the day-to-day administration of the IAM system.
o Involved in troubleshooting and resolving IAM issues.
o Participate in IAM projects and initiatives.
o Work with internal customers, business analysts, and application teams to
understand and implement access requirements.
o Participate in IAM audits and review access control reports to identify
potential risks.
o Update and maintain the IAM system according to organisation business
change.
o Creating and managing user groups in the identity and access management
system.
o Configuring and enforcing access policies and procedures.
o Monitoring user activity in the identity and access management system.
o Reporting on identity and access management system activity.
o Identifying and remediating identity and access management issues.
o Maintaining up-to-date knowledge of identity and access management best
practices.
o Provide training to new users on the IAM system.
o Documenting IAM processes and procedures.

Minimum of 6 years of experience in cybersecurity with a relevent experience of 2 years on


Identity and Access Management

What non-technical skills you will have:

 Understand and able to articulate the organisation’s IAM strategy.


 Understand the various IAM tools and technologies available and be able to
recommend solutions that will meet the organisation’s needs.
 Be able to support IAM projects.
 Be able to troubleshoot IAM issues and develop creative solutions to solve problems.
 Have a strong understanding of security concepts and how they apply to IAM.
 Be able to develop IAM metrics and KPIs to track progress and measure success.
 Be able to provide clear and concise reports to management on the status of IAM
within the organisation.
 Be able to develop and deliver IAM training to both technical and non-technical staff.
 Be able to research and stay up-to-date on IAM trends and best practices.
 Work effectively with other IT team members to ensure that IAM solutions are
integrated seamlessly into the overall IT infrastructure.
 Good organisational skills and attention to detail.
 Ability to work individually and as part of a team.
 Excellent communication and project administration skills.
 Strong analytical skills.

What technical skills you will have:


o Degree in computer science, information technology, or a related field.
o Any certification in Windows (Azure, AD) and/or AWS will be useful.
o At least two years of experience in identity and access management or a
related field.
o Understanding of directory services (LDAP, Active Directory, Entra, etc.)
o Knowledge of security protocols (SSH, TLS, etc.)
o Proficient in at least one scripting language (PowerShell, Python, Ruby, etc.)
o Experience with IAM tools (SailPoint, CyberArk, Okta, Ping Identity, etc.)
o Familiarity with database concepts and relational databases, such as Microsoft
SQL Server.
o Familiarity with multiple operating systems (Azure, Windows, Unix/Linux
etc.)
o Proficient in Microsoft Office (Excel, Word, PowerPoint).

You might also like