The IAM Security Analyst implements access governance programs, defines access control policies, manages user identities, and ensures adherence to security compliance.
Available Locations: Bangalore
About The Role
As an Identity and Access Management (IAM) Security Analyst you will play a key role in efficiently managing user identities and access across the enterprise. You will be responsible for implementing technologies and designing processes to ensure users have authorized access to resources and systems.
What You'll Do
- Establish and execute access governance programs and policies
- Define and enforce access control policies, including role-based access control (RBAC), attribute based access control (ABAC), and policy based access controls (PBAC)
- Ensure access adhere to the principle of least privilege and segregation of duties (SoD).
- Develop and execute an access certification program and scale to all systems
- Design, implement, and manage Identity Access & Governance policies and procedures.
- Define and enforce privileged access management (PAM) policies to secure sensitive systems and data.
- Manage user onboarding, offboarding, and role changes, ensuring adherence to security policies and compliance requirements.
- Collaborate with cross-functional teams, including IT, security, and compliance, to ensure IAM aligns with business goals.
- Communicate IAM-related updates and recommendations to stakeholders.
- Maintain comprehensive documentation of IAM policies, processes, and configurations.
- Generate reports and metrics related to IAM activities and security posture.
- Stay current with industry best practices, regulations, and compliance standards related to IAM, such as FedRamp, SOX, GDPR, PCI, and NIST.
- Provide operational support of IAM systems including an on-call rotation that may include after hours calls
Examples of desirable skills, knowledge and experience.
- In-depth understanding of access governance
- Experience in Identity Governance & Administration (IGA) solutions
- Performing policy enforcement, role management, and access certifications
- Experience implementing privileged access management (PAM)
- Experience developing IAM security standards and policies
- Preferred background in scripting and/or application development to automate identity and access management processes.
Top Skills
Abac
Application Development
Iam
Iga
Pam
Pbac
Rbac
Scripting
Security Compliance Standards
Similar Jobs at Cloudflare
Cloud • Information Technology • Security • Software • Cybersecurity
Manage user identities and access, implementing IAM technologies, enforcing access policies, and ensuring compliance with security standards.
Top Skills:
AbacAccess ManagementCompliance StandardsIdentity GovernanceIga SolutionsPamPolicy Based Access ControlRbacScripting
Cloud • Information Technology • Security • Software • Cybersecurity
Manage user identities and access, implementing IAM technologies, enforcing access policies, and ensuring compliance with security standards.
Top Skills:
AbacAccess ManagementCompliance StandardsIdentity GovernanceIga SolutionsPamPolicy Based Access ControlRbacScripting
Cloud • Information Technology • Security • Software • Cybersecurity
Lead and support local operations in People Services, manage payroll accuracy, improve processes, and ensure compliance in a fast-paced environment.
Top Skills:
WorkdayZendesk
What you need to know about the Pune Tech Scene
Once a far-out concept, AI is now a tangible force reshaping industries and economies worldwide. While its adoption will automate some roles, AI has created more jobs than it has displaced, with an expected 97 million new roles to be created in the coming years. This is especially true in cities like Pune, which is emerging as a hub for companies eager to leverage this technology to develop solutions that simplify and improve lives in sectors such as education, healthcare, finance, e-commerce and more.