Senior Business Analyst - Remote / Telecommute
Cynet systems Inc
Durham (NC)
Remote
USD 85,000 - 110,000
Full time
Job summary
A leading cybersecurity solutions provider is seeking an experienced Business Analyst to perform detailed analysis for privileged access management. The ideal candidate will have over 5 years of experience in IT or cybersecurity projects, strong analytical skills, and a solid understanding of IAM and PAM. Responsibilities include gathering requirements, mapping business processes, and ensuring compliance with security policies. This role is based in Durham, North Carolina.
Qualifications
- 5+ years of experience as a Business Analyst in large-scale IT or cybersecurity projects.
- Proven experience in requirements gathering, process mapping (as-is/to-be), and writing functional specifications.
- Strong understanding of Identity and Access Management (IAM) and Privileged Access Management (PAM) concepts.
Responsibilities
- Conduct workshops and interviews with stakeholders to gather, analyze, and validate business requirements for privileged access.
- Create detailed functional and non-functional requirement documents to guide the technical configuration of the PAM solution.
- Map current and design future business processes for privileged access requests.
Skills
Business process analysis and documentation
Requirements elicitation and stakeholder communication
PAM/IAM systems understanding
Workflow design and integration analysis
Regulatory and compliance awareness
Education
Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field
Responsibilities
- Conduct workshops and interviews with stakeholders to gather, analyze, and validate business requirements for privileged access.
- Create detailed functional and non-functional requirement documents to guide the technical configuration of the PAM solution.
- Map current (“as-is”) and design future (“to-be”) business processes for privileged access requests, approvals, usage, and revocation.
- Analyze existing access control workflows to identify security gaps and process inefficiencies.
- Collaborate with technical leads and business owners to design secure, efficient workflows within PAM and MDM.
- Define integration requirements between PAM solutions and enterprise systems, including ITSM tools such as ServiceNow.
- Act as a bridge between business and technical teams, translating technical complexities into business language and impact.
- Work with business leaders to define project scope, objectives, and risk mitigation strategies.
- Facilitate regular meetings between security architects, IT admins, and business units to align project goals.
- Ensure all requirements and processes comply with internal security policies and external regulatory frameworks (e.g., SOX, GDPR).
- Support audit preparation by developing checklists and maintaining detailed documentation.
- Assist in creating training materials and user documentation to support change management and user adoption.
Requirement/Must Have
- 5+ years of experience as a Business Analyst in large-scale IT or cybersecurity projects.
- Proven experience in requirements gathering, process mapping (as-is/to-be), and writing functional specifications.
- Strong understanding of Identity and Access Management (IAM) and Privileged Access Management (PAM) concepts.
- Excellent analytical, problem-solving, and stakeholder management abilities.
- Strong communication skills, capable of engaging both technical and non-technical audiences.
Preferred Qualifications
- Hands-on experience with enterprise PAM solutions such as CyberArk.
- Familiarity with discovering and classifying privileged credentials (service accounts, admin accounts, application accounts).
- Experience with compliance frameworks like SOX, HIPAA, or GDPR.
- Knowledge of Agile or hybrid project methodologies.
- Experience integrating PAM with ITSM tools or other security platforms.
Skills
- Business process analysis and documentation.
- Requirements elicitation and stakeholder communication.
- PAM/IAM systems understanding.
- Workflow design and integration analysis.
- Regulatory and compliance awareness.
Qualification and Education
- Bachelor’s degree in Information Technology, Computer Science, Cybersecurity, or a related field preferred.