- Company Name
- Ascendum Solutions
- Job Title
- Identity Access Management Analyst
- Job Description
-
**Job Title:**
Identity Access Management (IAM) / Privileged Access Management (PAM) Analyst
**Role Summary:**
Proactive IAM/PAM analyst responsible for evaluating, monitoring, and governing access controls across enterprise systems. Ensures compliance with internal policies, regulatory standards, and industry best‑practice frameworks while supporting authentication, authorization, and privileged‑access processes.
**Expectations:**
- 2–5 years of hands‑on IAM/PAM experience with a focus on control compliance.
- Ability to identify, report, and remediate access‑control gaps (excessive permissions, orphaned accounts, unauthorized access).
- Collaboration with engineering, cyber‑security, and audit teams to resolve violations.
- Support periodic access‑review, certification, and privileged‑account audit cycles.
**Key Responsibilities:**
- Contribute to IAM/PAM project implementation and ongoing governance.
- Evaluate IAM/PAM controls against SOX, HIPAA, ISO 27001, NIST, etc., and document findings.
- Generate reports for leadership and compliance stakeholders.
- Use platforms such as SailPoint, CyberArk, Azure AD, Okta, or similar to analyze access patterns and detect anomalies.
- Assist in developing and refining IAM/PAM policies, procedures, and standards.
- Support authentication and authorization mechanisms across enterprise network infrastructure, including Cisco ISE.
- Participate in data‑analytics activities related to access‑control monitoring.
**Required Skills:**
- Hands‑on experience with IAM/PAM tools (SailPoint, CyberArk, Azure AD, Okta, etc.).
- Strong analytical, problem‑solving, and documentation abilities.
- Effective verbal and written communication.
- Familiarity with regulatory frameworks (SOX, HIPAA, ISO 27001, NIST).
- Working knowledge of Cisco Identity Services Engine (ISE).
**Preferred Skills (not mandatory):**
- Scripting/automation (PowerShell, Python).
- Data‑visualization (Tableau, Power BI) and Snowflake analytics.
- Understanding of Zero Trust and least‑privilege models.
**Required Education & Certifications:**
- Bachelor’s degree in Information Security, Computer Science, or related field (preferred).
- Relevant certifications are a plus: CISSP, CISM, or vendor‑specific IAM/PAM certifications.