Cyber Security Engineer
Location: Hybrid 3 days per week onsite at location on req flexible depending on business needs
About the Role:The Identity and Governance Administration (IGA) Operations Specialist will be responsible for managing and supporting the operational aspects of our IGA systems. This role is essential to ensure the security, efficiency, and compliance of IGA processes within the organization.
The specialist will collaborate with various teams, including IT Security, Compliance, and Application Support, to ensure that users have appropriate access to systems and applications while maintaining strict controls.
Key Responsibilities:
Access Management:Administer and manage user access requests, including provisioning, modification, and deactivation of user accounts across multiple systems and platforms.Perform user account audits to ensure compliance with internal security policies and external regulatory requirements.Implement and enforce least privilege principles and segregation of duties to minimize risks associated with unauthorized access.
Oversee and administer user access requests, encompassing the provisioning, modification, and deactivation of user accounts across various systems and platforms.Conduct routine user account audits to ensure adherence to internal security policies and external regulatory requirements.Implement and uphold the principles of least privilege and segregation of duties to mitigate risks associated with unauthorized access.
IAM System Administration:Administer and maintain IAM tools (Microsoft Entra ID, SailPoint).Manage identity lifecycle, ensuring accurate user provisioning, modification, and deprovisioning across systems and applications.Authentication & Authorization:Understand authentication protocols, including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC).Troubleshoot and resolve issues related to access, associated with SSO and MFA.Collaborate with cross-functional teams to implement and enhance authentication and authorization systems in alignment with business and security requirements.
Compliance & Security:Provide assistance in audits, internal reviews, and compliance checks related to Identity and Access Management (IAM) practices and policies.Collaborate with the security team to implement IAM best practices and recommend enhancements to improve the organization's overall security posture.
Monitoring & Reporting:Supervise IGA systems to identify potential security risks or irregularities, and proactively offer solutions to mitigate these risks.Produce detailed reports on user access patterns, security events, and policy adherence to maintain organizational governance and management oversight.Perform routine evaluations of IGA processes and workflows, and propose optimizations aligned with industry best practices and evolving security threats.improvements where necessary.
Incident Management:Investigate and resolve security incidents related to user access, including unauthorized access and security breaches.Collaborate with the IT security team during incident response activities to contain, analyze, and mitigate potential threats.
User Support:Provide support to end-users and administrators regarding IGA systems, policies, and security best practices.