Identity and access Management (IAM), Privileged Access Management (PAM), Business Analysis (BA)
Participate in the design, development and implementation of security initiatives to ensure the best possible measures are in place to maintain a secure operation.
Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases.
Develop, implement, and enforce security strategies, policies and procedures. Analyze, recommend and implement security technologies specifically for a Privileged Access Management platform.
Knowledge of information security technologies, networks, and operating systems;
Knowledge of risk management frameworks, industry best practices, security policy creation;
Expert understanding of routing and network protocols;
7+ years experience. Experience in multiple business areas and on multiple project types and can incorporate interdepartmental dependencies and inpact into project. Leads and coaches other business analysts at all levels. Acts as a liaison between the IT development group and business units for the development and implementation of new systems and enhancement of existing systems; Evaluates new applications and identifies systems requirements; Evaluates new IT developments and evolving business requirements, and recommends appropriate systems alternatives and/or enhancements to current systems; Prepares communications and makes presentations on system enhancements and/or alternatives. Works under the direction of the Corporate Security IAM program management.
PAM Specific skills:
• Accountable for Stakeholder analysis and maintenance
• Training and product demos
• Analyze server to application mapping
• Maintain asset inventory
• Conduct privileged account review
• Track privileged account clean up
• Collect and maintain requirements
• Document Current mode of operation and future mode of operation
• Conduct User acceptance Testing
• Manual or automated account on-boarding (on-board secrets or create groups)
•Coordinate IT and Network BA's in their Bell onboarding venture
•Leads the establishment, documentation building of policies for net new use cases for PAM (OS, Databases, Apps)
•Performs end-to-end testing of new use cases (Pre-Prod, PoC)
•Manages security exception requests from the PAM team (IT and Network)
•Ensures that all security processes and policies are respected
•Ensures that each activity is documented in the Wiki and articulates the ops transition
•Build Break glass process (unlimited administrator)
•Establish the front door intake process