Job Title or Location
RECENT SEARCHES

Business Analyst (IAM)_ Brampton, ON

infinity Solutions - 11 Jobs
Ontario, ON
Full-time
Entry Level
Posted 11 days ago

Hi,

Please share your resume at [email protected] if interested in below role.

Business Analyst (IAM)

Location: Brampton, ON

Required Skills and Responsibilities:
5-7 years of Implementing Identity & Access Management experience. Emphasis on design and deployment of requirements, processes, and procedures
5-7 years of relationship management experience required ability to communicate and influence various groups
Specific required experience in areas below: Privileged Access Management (Edline, CyberArk, MS Privileged Identity Management)
Customer IAM Functions (Sign on, Account Recovery, Registration, User ID hygiene) IAM Standards (SAML, OIDC, SCIM) o Role Based Authentication Access Reporting, Access Provisioning
Experience with frameworks/standards such as NIST, ISO 27002, ISF
Previous experience in the telecommunications and/or media industry is an asset
Undergraduate degree in Computer Science or Engineering, or emphasis in security and/or processes related field
CISSP or similar certifications
Communicates effectively with meaningful and articulate verbal discussions
Creates clear, concise and memorable written materials.
Strong business and technical acumen
Ability to work in composite teams and achieve goals and meet deadlines in a fast-paced environment
Roles and Responsibilities:
Being able to work with project managers and PMO to delivery of features, enhancements and projects in Identity and Access Management
Business relationship management to understand business operations and functional needs, prioritization, and cultural change management.
Collaborate with business and technology stakeholders to develop processes and tools to optimize access within Rogers.
Effectively communicates and collaborates on information security risk and solutions to a diverse audience from technical staff to senior executives.
Focuses on more complex Identity and Access Management issues and provides pragmatic solutions and recommendations
Aligns Information Security Governance activities with the strategies/plans for Security Architecture, Operations
Ability to read and understand technical designs documents and architecture."