Job Title: Identity Access Management (IAM) Analyst Location: 100% Remote Duration: 6-12 Months Contract Notes: IAM Analyst - Assist in the discovery and cross-functional analyst work related to Azure identity implementation and integrations. BA skills with IAM and SSO knowledge. Description: Vantage Data Centers is seeking a skilled IAM Business Analyst with Single Sign-On (SSO) experience. You will be joining our global team and contributing to the successful implementation of our IAM initiatives by collaborating closely with Business Owners, Project Managers, Enterprise Architects, Cybersecurity Team members, and other stakeholders to gather, document, and translate business requirements into eective IAM solutions. What you will be doing
- Lead engagement with business owners /third-party application vendors through SSO discovery
- Interact with business owners of third-party applications to explain SSO, address required questions, and assess risks.
- Participate in Sprint grooming and retrospective sessions, attend daily stand-ups, meet with business owners and third-party application vendors to perform due diligence, and document daily progress of tasks in Jira.
- Report weekly progress of assigned Sprint tasks completed, blocked, and on deck for the upcoming week.
- Applying IAM principles, industry standards, and best practices
- Proficiently analysing intricate IAM systems, identifying gaps and suggesting impactful solutions to bolster security and compliance
- Bridging the gap between the business' needs and technical solutions (specific to identify and access control)
- Producing documentation, encompassing process ows, system schematics, and solution designs
- Converting business requirements into IAM specific specifications
- Supporting the identification on how dierent user roles and groups should access resources and assist in the defining of policies to ensure security and compliance.
Core skills required:
- Experience implementing SSO using SAML and OIDC
- Ability to communicate with a variety of stakeholders and can explain technical concepts to non-technical users.
IAM Initiatives
- Collaborates with stakeholders, including cross-functional teams, and IT Teams to understand their needs for user access to systems, applications, and data
- Conducting interviews, workshops, and analysis of existing processes
- Converts business requirements into IAM-specific specifications, identifying how dierent user roles and groups should access resources, and define policies to ensure security and compliance.
- Works closely with IAM architects and technical teams to design solutions that align with security policies and regulatory requirements.
- Contributing to the creation of IAM workows, processes, and access control mechanisms
- Documenting the entire lifecycle of user identities, including onboarding, changes, and offboarding
- Defining processes for user provisioning, de-provisioning, and access revocation, ensuring that users have appropriate access rights at all times.
- Identifies security risks associated with user access, privacy data, or other potential data risk.
- Coordinates and participates in User Acceptance Testing (UAT) to verify that IAM solutions meet business requirements and function as expected before deployment.
- Drives change management strategies related to IAM initiatives.
- Develops communication plans, conducts training sessions for end-users, and supports the organization to adapt to new IAM processes.
- Creates comprehensive documentation, including process ows, system diagrams, and maintains accurate records of activities, decisions, and outcomes related to IAM implementations.
- Identifies opportunities for optimizing IAM processes and systems, suggesting enhancements to address evolving security and access needs.
- Serves as a bridge between business requirements and technical implementation, ensuring that technical solutions meet business goals and are aligned with the organization's strategic vision.
Nice to have skills:
- Can work under minimal supervision.
- At ease in a global, multi-cultural environment
- Deep understanding of cybersecurity principles, threats, and trends
- Proficiency in languages like Python, PowerShell, or JavaScript for scripting and automations
- Familiarity with data analytics tools and visualization platforms
- Knowledge of cloud IAM solutions
- Familiarity with specific IAM tools and platforms
- Strong negotiation skills, cultural sensitivity, adaptability, and the ability to inuence stakeholders
- Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Identity and Access Manager (CIAM)