Job Search and Career Advice Platform

Enable job alerts via email!

IAM Security Engineer

BCXP

Centurion

On-site

ZAR 300 000 - 400 000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology firm located in Centurion is seeking an IAM Tech Officer to manage user access to information systems and ensure compliance with security policies. The candidate should have at least 2 years of experience in IT security, focusing on access management. Responsibilities include user account management, supporting audit preparations, and developing user administration practices. The ideal education includes a Grade 12 diploma and a preferred degree in Computer Science or IT. Strong cybersecurity skills are essential.

Qualifications

  • 2 years of experience in an IT security support role focused on security/access.
  • Experience with network and desktop technology methods providing innovative solutions.
  • Strong customer focus with a track record of operational performance improvements.

Responsibilities

  • Provide, remove, modify, and review user access to information systems.
  • Develop and document user administration and audit practices.
  • Manage privileged access management functions in compliance.

Skills

Cybersecurity Governance & Framework
Cybersecurity Tools & Solutions
Finance and Budget Management
Project Management

Education

Grade 12 National Diploma
3 year Degree in Computer Science or Information Technology

Tools

Microsoft Office
Job description

The Identity and Access Management (IAM) Tech Officer provides, removes, modifies, and reviews user access to information systems including, but limited to, confirm roles and actions are correct based on user function, business need, and policies for least privilege access

Key Deliverables / Primary Functions
  • Identify and develop role-based sec
  • Identify and develop role-based security access to match job requirements and adhere to the least privilege principle.
  • Create and disable user accounts, as requested, provided appropriate approvals.
  • Ensure access rights are updated in a timely manner as needs change due to events; including, but not limited to, termination, role changes, new systems, and regulatory requirements.
  • Update and close tasks associated with access management requests and meet service level targets.
  • Develop and document user administration and audit practices.
  • Manage PAM functions in terms of compliance.
  • Ensure compliance with related industry regulations and respond to information security audits.
  • Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations.
  • Suggest improvements to user access request workflows.
  • Assist with audit preparations and help develop responses and action items for an associated finding.
  • Provide user access administration training.
  • Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration.
  • Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations.
Core Functional Skills & Capabilities
  • Cybersecurity Governance & Framework
  • Cybersecurity Tools & Solutions
  • Finance and Budget Management
  • Project Management
Core Behavioural Competencies
  • Culture Match
  • Job Match
  • Applying expertise & Technology
  • Analysing
  • Entrepreneurial & Commercial thinking
Minimum Qualifications

NQF 4: Grade 12 National Diploma

Additional Education -Preferred /Advantage

NQF 6: 3 year Degree/ Diploma/ National Diploma in Computer Science or Information Technology

Experience
  • 2 years of experience working in an IT security support role with an emphasis on security/access.
  • Experience supporting of an understanding of network and desktop technology methods that provide innovative solutions to customers.
  • Strong customer focus with a successful track record of delivery and operational performance improvements across an organization.
  • Proficient in Microsoft Office programs.
Certifications
  • A security industry certification is preferred including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+.
  • Cyberarc, BeyondTrust or Sailpoint certified technical specialist
Level of Engagement & Span of Control
  • Span of Control: None
  • Level of Engagement: Interact with similar levels, clients and with various stakeholders within BCX
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.