Ops Spec: IAM Security Engineer

Centurion, Gauteng, ZA

Apply now Apply later

Business unit, Department, Reporting

Business Unit  Cloud Platform Solutions Department Cyber Security Position reports to ME: Cyber Security Engineering Job grade S6

 

Core Description

The Ops Specialist: IAM Security Engineer role is responsible for ensuring that procured or developed IAM systems are implemented properly and function as intended. 

This role work within the Cyber Security Operations team to provide, remove, modify, and review user access to information systems including, but not limited to the confirmation of roles and to ensure that actions are correctly aligned based on user function, business need, and policies for least privilege access

Key Deliverables / Primary Functions

  • Identify and develop role-based security access to match job requirements and adhere to the least privilege principle. 
  • Create and disable user accounts, as requested, provided appropriate approvals. 
  • Ensure access rights are updated in a timely manner as needs change due to events; including, but not limited to, termination, role changes, new systems, and regulatory requirements. 
  • Update and close tasks associated with access management requests and meet service level targets. 
  • Perform access reviews to ensure access to resources matches job function. 
  • Develop and document user administration and audit practices. 
  • Work with application and data owners and business unit leaders to establish and maintain consistent access review activities. 
  • Manage PAM functions in terms of compliance. 
  • Ensure compliance with related industry regulations and respond to information security audits. 
  • Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations. 
  • Suggest improvements to user access request workflows. 
  • Assist with audit preparations and help develop responses and action items for an associated finding. 
  • Provide user access administration training. 
  • Assist and support information security, system administration, and project teams with the integration of programs that intersect with user administration. 
  • Participate in the design and implementation of centralized user access control administration to internal software applications. 
  • Preserve all records that indicate changes made to access control lists to facilitate audits and other investigations

Core Functional Skills & Knowledge

Service Level Agreement (SLA) ManagementMicrosoft OfficeCybersecurity Governance & FrameworkCybersecurity Tools & Solutions

Core Behavioural Competencies

Job MatchCulture MatchAnalysingCoping with pressures & setbacksDelivering Results & Meeting customer expectationsFollowing instructions & procedures

Minimum Qualifications

NQF 6: 3 year Degree/ Diploma/ National Diploma in Computer Science or Information TechnologyOR NQF 4: Grade 12

Additional Education -Preferred /Advantage

Experience

3 years’ experience orking in an IT security support role with an emphasis on security/access. Demonstrated understanding of network and desktop technology methods that provide innovative solutions to customers.

Strong customer focus with a successful track record of delivery and operational performance improvements across an organization. 

OR

Grade 12 & 5 years’ experience working in an IT security support role with an emphasis on security/access

Certifications

Cyberarc, BeyondTrust or Sailpoint certified technical specialistValid installation & support certifications in 2 or more OEM's, Dell/HPE/Oracle/Huawei/IBM/Lenovo

Professional Memberships in Relevant Industry

Level of Engagement & Span of Control

Span of Control         : 0

Level of Engagement : Interact with similar levels, clients and with various stakeholders within BCX

Special Requirements / Employment Condition

Required to travel locallyRequired to be available 24/7Ability to cope under pressure

Workplace / Physical Requirements

BillableHybrid Remote Worker
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Audits Cloud Compliance Computer Science Governance IAM Oracle SailPoint

Perks/benefits: Team events

Region: Africa
Country: South Africa

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.