IAM Security Analyst
Listed on 2026-02-16
-
IT/Tech
Cybersecurity, Information Security, Data Security, IT Support
Job Description
We are seeking an IAM (Identity and Access Management) Security Analyst to join our dynamic Security team.
The ideal candidate is detail-oriented, analytical, and proactive
, with a strong understanding of identity security principles and technologies. You will be responsible for supporting and enhancing the IAM framework across the organization, ensuring secure and compliant access to systems and data.
This role involves overseeing the full identity lifecycle, including authentication and authorization mechanisms, and monitoring identity exposure risks. Your contributions will be essential in safeguarding digital identities and maintaining robust access controls across SCOR's infrastructure.
ResponsibilitiesAs an IAM Security Analyst, you will be responsible for the design and operational support of IAM services. You will validate workflows, manage authentication and authorization processes, and ensure that identity governance aligns with organizational policies. You will also collaborate with IT and security teams to automate provisioning, monitor identity exposure, and enforce access controls.
Key Responsibilities- IAM Operations and Support: Validate identity workflows, authenticate permissions, and ensure proper role-based access control (RBAC).
- IAM Design and Implementation: Develop and maintain a comprehensive IAM framework, including architecture definition and technical solution selection.
- Lifecycle IAM Management: Oversee the full lifecycle of digital identities, including entitlement and access review coordination.
- Identity Exposure Monitoring: Use OSINT tools to monitor identity exposure and propose mitigation plans for at-risk users.
- User Provisioning and De-provisioning: Develop automation to improve onboarding and ofboarding workflows, user and account updates, and deletions across systems and applications.
- Authentication Services: Assist application and system owners through SSO implementation, MFA, and biometric authentication solutions.
- Authorization Services: Maintain and enforce access policies using RBAC and ABAC models.
- Identity Governance and Administration (IGA): Ensure compliance with identity policies and maintain audit trails.
- Privileged Access Management (PAM): Oversee and generalize privilege access mechanisms to critical systems by privileged users.
- Centralized Directory Services: Coordinate and monitor centralized user directories
- Access Management: Control and monitor access to resources, ensuring only authorized users gain access.
- Identity Analytics & Assessment: Leverage analytics to detect risky behaviors and prevent breaches.
- Validate and support IAM workflows and access controls.
- Design and oversee IAM architecture and solutions.
- Manage identity lifecycle and coordinate access reviews.
- Monitor identity exposure and recommend mitigation actions.
- Automate provisioning and de-provisioning processes.
- Support authentication and authorization services implementation.
- Ensure compliance with identity governance policies.
- Secure privileged accounts and monitor their usage.
- Security Principles: Defend the business, support the business, and promote responsible information security behavior.
- Team Values: Professionalism, Ethics, Transparency, and Team Spirit.
Your expertise in IAM and Cyber Security will be key in supporting technical and functional teams to implement effective identity controls and mitigate evolving cyber threats.
Hard skills- Strong background in IAM and Cyber Security.
- Experience with IAM tools and technologies (e.g., IGA, PAM, SSO, MFA).
- Knowledge of identity lifecycle management and access control models.
- Familiarity with OSINT tools for identity exposure monitoring.
- Understanding of directory services and authentication protocols (LDAP, SAML, OAuth, etc.).
- Knowledge in Microsoft Identity Goverance.
- Strong analytical and problem-solving skills.
- Effective communication and collaboration abilities.
- Ability to work independently and in cross-functional teams.
- Attention to detail and a proactive mindset.
- Bachelor's or Master's degree in Computer Science, Cybersecurity, or a related field.
As a leading…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).