Reporting Structure: Identity and Access Manager IAM, IT-Security
Summary of the Position:
The Identity and Access Governance Specialist is responsible for managing the User Access and Identity to all critical Applications and related business processes.
The Identity and Access Governance Specialist will use technology to initiate, capture, record and manage user identities and their related access permissions. This will ensure that access privileges are granted according to one interpretation of policy and all individuals and services are appropriately authenticated, authorised and auditable.
Key Outputs and Accountabilities:
Manage all helpdesk requests assigned to the Identity and Access Department
Prepare and present month end reports
Identify trends and implementing solutions to manage challenges
Work independently with business users at all levels to define project concept, objectives and approach
Elicit requirements using interviews, document analysis, requirements workshops, site visits, business process descriptions, business analysis.
Define project scope and objectives and take assigned project from original concept through final implementation
Conduct project meetings and provides single point of contact for assigned projects by co-ordinating interaction and communication among IT and business personnel and identifying and co-ordinating assignments of internal resources and external contractors to meet project requirements.
Liaise with customer base (management) on system requirements and integration with business processes.
Assist operations and support staff with the resolution of operational problems of customer base in relevant tools where applicable.
Assist with technical guidance and on-the-job training of less experienced staff, and check work of colleagues as required.
Apply and report on security patches and upgrades on a regular basis, and upgrade administrative tools and utilities. Configure / add new services as necessary to adhere to the company’s Information security standards.
Upgrade and configure system software that supports the Information Security based
infrastructure or applications as per project or operational needs.
Maintain operational, configuration, or other procedures relating to Information security.
Perform periodic performance reporting to support capacity planning.
Perform ongoing performance tuning, hardware upgrades, and resource optimization as required.
Maintain information security standards in line with the policies and industry best practice
Interfaces with Information Management Team and IT Technical team to define and create Information Security services and solutions in line with business requirements
Interface with 3rd party vendors to ensure operations conform to best practice and industry standards.
Perform operations as part of the Information Security team
Ensure that the security administration team meets the agreed incident, problem and service level agreements.
Adhere to team plans for Projects as required, manage own deliverables and timeframes to ensure that the team deliver to committed tasks and projects deadlines.
Technology Innovation and growth
Ensure that the required modifications are made to designs, configurations and architecture of existing systems to ensure compliance to information security standards
Proactively improving service availability wherever possible, and optimising the availability of the IT Security Infrastructure to deliver cost-effective improvements that deliver tangible benefits to the business.
Research knowledge of future demand for IT services and predicts the effects of demand on performance service levels and information security.
Provide direction for future capacity requirements based on business plans, usage trends, sizing of new services, Information Security requirements etc.
Minimum grade 12 / NQF level 4 qualification
SAILPOINT qualifications or equivalent experience essential
ITBTECH or equivalent preferred
Linux / LDAP experience preferred
Minimum 3+ years SAILPOINT experience (Operational / Integration) essential
Microsoft Active Directory
Linux Open LDAP
If you do not receive any feedback within 2 months, please consider your application as unsuccessful.