The IAM Security Analyst implements access governance programs, defines access control policies, manages user identities, and ensures adherence to security compliance.
Available Locations: Bangalore
About The Role
As an Identity and Access Management (IAM) Security Analyst you will play a key role in efficiently managing user identities and access across the enterprise. You will be responsible for implementing technologies and designing processes to ensure users have authorized access to resources and systems.
What You'll Do
- Establish and execute access governance programs and policies
- Define and enforce access control policies, including role-based access control (RBAC), attribute based access control (ABAC), and policy based access controls (PBAC)
- Ensure access adhere to the principle of least privilege and segregation of duties (SoD).
- Develop and execute an access certification program and scale to all systems
- Design, implement, and manage Identity Access & Governance policies and procedures.
- Define and enforce privileged access management (PAM) policies to secure sensitive systems and data.
- Manage user onboarding, offboarding, and role changes, ensuring adherence to security policies and compliance requirements.
- Collaborate with cross-functional teams, including IT, security, and compliance, to ensure IAM aligns with business goals.
- Communicate IAM-related updates and recommendations to stakeholders.
- Maintain comprehensive documentation of IAM policies, processes, and configurations.
- Generate reports and metrics related to IAM activities and security posture.
- Stay current with industry best practices, regulations, and compliance standards related to IAM, such as FedRamp, SOX, GDPR, PCI, and NIST.
- Provide operational support of IAM systems including an on-call rotation that may include after hours calls
Examples of desirable skills, knowledge and experience.
- In-depth understanding of access governance
- Experience in Identity Governance & Administration (IGA) solutions
- Performing policy enforcement, role management, and access certifications
- Experience implementing privileged access management (PAM)
- Experience developing IAM security standards and policies
- Preferred background in scripting and/or application development to automate identity and access management processes.
Top Skills
Abac
Application Development
Iam
Iga
Pam
Pbac
Rbac
Scripting
Security Compliance Standards
Similar Jobs at Cloudflare
Cloud • Information Technology • Security • Software • Cybersecurity
Manage user identities and access, implementing IAM technologies, enforcing access policies, and ensuring compliance with security standards.
Top Skills:
AbacAccess ManagementCompliance StandardsIdentity GovernanceIga SolutionsPamPolicy Based Access ControlRbacScripting
Cloud • Information Technology • Security • Software • Cybersecurity
Manage user identities and access, implementing IAM technologies, enforcing access policies, and ensuring compliance with security standards.
Top Skills:
AbacAccess ManagementCompliance StandardsIdentity GovernanceIga SolutionsPamPolicy Based Access ControlRbacScripting
Cloud • Information Technology • Security • Software • Cybersecurity
Lead and support local operations in People Services, manage payroll accuracy, improve processes, and ensure compliance in a fast-paced environment.
Top Skills:
WorkdayZendesk
What you need to know about the Mumbai Tech Scene
From haggling for the best price at Chor Bazaar to the bustle of Crawford Market, the energy of Mumbai's traditional markets is a key part of the city's charm. And while these markets will always have their place, the city also boasts a thriving e-commerce scene, ranking among the largest in the region. Driven by online sales in everything from snacks to licensed sports merchandise to children's apparel, the local industry is worth billions, with companies actively recruiting to meet the demands of continued growth.