Job Description :
• 15+ over all experience
• Developing access management policies, procedures, and standards that govern how employees, partners, and machines access an organization's digital assets.
• Conducting risk assessments to identify potential security threats and vulnerabilities related to identity and access management.
• Designing and implementing security systems that comply with regulatory requirements and industry best practices such as NIST, HIPAA, and ISO 27001.
• Maintaining and monitoring the identity management system to ensure that it operates optimally while detecting and addressing security incidents promptly.
• Collaborating with application teams, IT managers, and business stakeholders to ensure that IAM security systems meet the organization's needs.
• Identify Access Needs: Work with key stakeholders, including IT managers, business owners, and compliance auditors, to identify each user's role and responsibility within the organization.
• Design Access Levels: Create a set of roles and permissions that determine what resources and data each user can access based on their job function, location, and other factors.
• Implement access controls: Configure access controls, including authentication, authorization, and encryption, to ensure that the right users have access to the right resources.
• Monitor Access Usage: Continually evaluate users' access patterns and usage to detect any anomalies that may indicate potential threats.
• Work closely with application developers to integrate access controls into the software code and ensure that the application satisfies the organization's security requirements.
• Implement access management solutions within the application environment to ensure that it aligns with the organization's security policies.
• Test and validate access controls through penetration testing and other techniques to ensure that the application's security posture is strong.
• Ensure consistency: By documenting procedures systematically, IAM Security Analysts ensure that all users are using the same policies and procedures when accessing sensitive data.
• Enable Accountability: Documentation makes it easier for IAM Security Analysts to identify who did what, when, and why, making them suitable for investigations.
• Facilitate Compliance: Documentation is essential for demonstrating regulatory compliance. Auditors can easily review the documentation to ensure that the organization has robust identity and access management controls.
• Conduct performance testing to identify and solve any access impediments or bottlenecks.
• Analyze access data to detect anomalous behavior patterns, identify security threats, and address vulnerabilities.
• Implementing Emerging Technologies - researching, evaluating, and implementing emerging technologies to improve access management systems' efficiency, accuracy and prevent new threats.