Role: IAM Business Analyst
Location: Reading, UK
Duration: Contract
Job Description:
Your responsibilities:
* Support the Target Operating Model discussion on operational level, blueprint IAM processes must be defined and described fitting the organization. These processes will help defined activities and responsibilities, where they will be sitting in the organization and help define resource need to support the IAM process & activities.
* IAM process designs & documentation.
* Provide training.
Your Profile:
* Essential skills/knowledge/experience:
* Active stakeholder management
* Business Analyst experience
* IAM BA experience
* Knowledge of IAM security requirements
* Experience of requirements creation and analysis
* Experience with identity lifecycle process design and testing, single sign-on, multi-factor authentication, and workflows
* Experience in process design (IGA, AM, PAM)
* Process documentation
* Knowledge of Microsoft Entra ID, SailPoint IQ, SailPoint NERM, CIAM, (CyberArk)
* Able to provide training
Desirable skills/knowledge/experience:
* Exceptional Communication: Ability to articulate complex security concepts clearly and concisely to technical teams, senior management, and non-technical stakeholders (both written and verbal).
* Strategic Thinking & Vision: Capability to foresee future security challenges and proactively develop long-term architectural solutions.
* Problem-Solving & Analytical Prowess: Strong ability to diagnose complex security issues, identify root causes, and devise innovative, practical solutions.
* Influence & Persuasion: Proven ability to gain buy-in and drive adoption of security best practices across diverse teams.
* Collaboration & Teamwork: A strong team player who can work effectively with cross-functional teams (development, operations, compliance, audit).
* Leadership & Mentorship: Demonstrated ability to lead security initiatives, guide junior team members, and foster a culture of continuous learning.
* Adaptability & Resilience: Ability to thrive in a fast-paced, evolving environment and navigate ambiguity with a positive and proactive approach.
* Attention to Detail: Meticulous approach to design and review, ensuring no critical security gaps.