The Identity & Access Management Specialist role forms part of the TIH Cyber Security team, and will be responsible for planning, overseeing, executing, analysing, measuring, and reporting on Identity & Access Management (IAM), including Privileged Access Management (PAM) operations functions.
Responsibilities
Information Security
Lead in detecting and analyzing security incidents including attacks, breaches, and identified vulnerabilities and remediate any security gaps in line with the security incident management procedure. Have a clear and sound understanding of the Identity & Access Management (IAM) and Privileged Access Management (PAM) landscape, both current and as it continues to evolve. Ensure, through appropriate planning, implementation, management and oversight of IAM & PAM technologies, TIH is able to appropriately and pro-actively authorise, provision and orchestrate, control, certify, track and audit access to key system infrastructure and application environments. Take ownership of and drive maturity of IAM & PAM technologies, and operation thereof within TIH. Maintain visibility of emerging technical IAM & PAM threats and trends, and adjust IAM & PAM operations activities to best defend against such threats.
Risk Management & Analysis
Ensure the organization is not exposed to undue risks by using risk management systems to achieve specific goals within a designated area of the business. Highlight and track risks related to IAM & PAM shortfalls, and propose appropriate actions in order to manage such risks.
Operational Compliance
Maintain and renew a deep knowledge and understanding of the organization's policies and procedures and of relevant regulatory codes and codes of conduct, and ensure own work adheres to required standards. OR Identify, within the team, patterns of non-compliance with the organization's policies and procedures, and with relevant regulatory codes and codes of conduct, taking appropriate action to report and resolve these and escalating issues as appropriate. Ensure accurate operation of IAM & PAM technologies, including ensuring designed business processes can be executed via IAM & PAM technologies, IAM & PAM technology stack is healthy and operational, and IAM & PAM processes can execute as expected to best service the business whilst ensuring IAM & PAM objectives are achieved.
Insights and Reporting
Prepare and coordinate the completion of various data and analytics reports. Assist in establishing and generating mature IAM & PAM operations metrics and indicators. Report on key cyber security operations metrics and indicators to operational teams, management, the executive, and relevant oversight forums. Ensure IAM & PAM workflow, notifications and reports are in place and optimal towards allowing the TIH business to operate as expected within the intended IAM & PAM context, and for IAM & PAM objectives and SLAs to be met.
Stakeholder Engagement
Develop stakeholder engagement through identifying stakeholders, finding out their needs/issues/concerns and reacting to these to support the communication of business information and decisions. Engage and maintain constructive relationships with IAM & PAM vendors, partners and services providers, to ensure TIH's IAM & PAM platforms can be successfully deployed, maintained, operated and improved.
Business Requirements Identification
Support collection of business requirements using a variety of methods such as interviews, document analysis, and workflow analysis to express requirements clearly and succinctly.
Project and Program Governance
Provide input, participate and collaborate on IAM & PAM related projects, specifically within the technology domain, towards ensuring appropriate involvement from an IAM & PAM team perspective and to allow for more seamless operationalisation and handover.
Unlock your greatness & be unstoppable
GENERAL EDUCATION
Degree or diploma in an information technology or related domain (Essential)
Relevant industry certifications, such as IAM or PAM vendor certifications, CISSP, etc. (Essential)
General Experience
Minimum of five (5) years experience in information / cyber security in general (Essential)
At least two (2) years experience in operating IAM & PAM technologies (Essential)
- SAQA Accredited Equivalent - It is the onus of the applicant to provide TIH and its subsidiaries with certified evidence that their qualification(s) meet the equivalent NQF level required for this role at time of application. As a registered Financial Service Provider, we are mandated to ensure that all our representatives are and remain fit and proper at all times. By applying for this role, you consent to having your relevant qualification and or accreditation or confirm that you are Kubernetes working towards meeting the competency requirements. You further consent to the relevant information being verified.