Today
Tech Officer: IAM Security Engineer
BCX
South Africa, Centurion
The Identity and Access Management (IAM) Tech Officer provides, removes, modifies, and reviews user access to information systems including, but limited to, confirm roles and actions are correct based on user function, business need, and policies for least privilege access Key Deliverables / Primary Functions Identify and develop role-based sec Identify and develop role-based security access to match job requirements and adhere to the least privilege principle. Create and disable user accounts, as requested, provided appropriate approvals. Ensure access rights are updated in a timely manner as needs change due to events; including, but not limited to, termination, role changes, new systems, and regulatory requirements. Update and close tasks associated with access management requests and meet service level targets. Develop and document user administration and audit practices. Manage PAM functions in terms of compliance. Ensure compliance with related industry regulations and respond to information security audits. Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations. Suggest improvements to user access request workflows. Assist with audit preparations and help develop responses and action items for an associated finding. Provide user access administration training. Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration. Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations. Core Functional Skills&Knowledge Cybersecurity Governance&FrameworkCybersecurity Tools&SolutionsFinance and Budget ManagementRisk ManagementProject Management Business unit, Department, Reporting Business Unit Cloud Platform Solutions Department Cyber Security Reports To Manager: Cyber Security Operations Grade OP1 Core Description The Identity and Access Management (IAM) Tech Officer provides, removes, modifies, and reviews user access to information systems including, but limited to, confirm roles and actions are correct based on user function, business need, and policies for least privilege access Key Deliverables / Primary Functions Identify and develop role-based sec Identify and develop role-based security access to match job requirements and adhere to the least privilege principle. Create and disable user accounts, as requested, provided appropriate approvals. Ensure access rights are updated in a timely manner as needs change due to events; including, but not limited to, termination, role changes, new systems, and regulatory requirements. Update and close tasks associated with access management requests and meet service level targets. Develop and document user administration and audit practices. Manage PAM functions in terms of compliance. Ensure compliance with related industry regulations and respond to information security audits. Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations. Suggest improvements to user access request workflows. Assist with audit preparations and help develop responses and action items for an associated finding. Provide user access administration training. Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration. Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations. Core Functional Skills&Knowledge Cybersecurity Governance&FrameworkCybersecurity Tools&SolutionsFinance and Budget ManagementRisk ManagementProject Management Core Behavioural Competencies Culture MatchJob MatchApplying expertise&TechnologyAnalysingCreating&InnovatingDelivering Results&Meeting customer expectationsEntrepreneurial&Commercial thinking Minimum Qualifications NQF 4: Grade 12 National Diploma Additional Education -Preferred /Advantage NQF 6: 3 year Degree/ Diploma/ National Diploma in Computer Science or Information Technology Experience 2 years of experience working in an IT security support role with an emphasis on security/access. Experience supporting of an understanding of network and desktop technology methods that provide innovative solutions to customers. Strong customer focus with a successful track record of delivery and operational performance improvements across an organization. Proficient in Microsoft Office programs. Certifications A security industry certification is preferred including but not limited to CISSP, SSCP, CISM, SANS GSEC, ECSA, ECSP, and Security+.Cyberarc, BeyondTrust or Sailpoint certified technical specialist Professional Memberships in Relevant Industry Level of Engagement&Span of Control Span of Control None Level of Engagement Interact with similar levels, clients and with various stakeholders within BCX Special Requirements / Employment Condition Required to travel locallyRequired to be available 24/7Ability to cope under pressure Workplace / Physical Requirements Hybrid Remote WorkerBillableRevenue Generating Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J-18808-Ljbffr
Attention! You will be redirected to another site