DMCA.com Protection Status
 
Search

Jr. Security Analyst, Identity & Access Management (IAM) || Sony is Hiring


Organization Name & Details –

Sony


Job Position/Designation-

Jr


Join us on LinkedIn – Great Place of Networking


Work Location/Company Headquators-

Banglore


Mandatory to join Telegram group for regular job updates


Salary/CTC (Annual)

Best In Industry


Experience Required

Freshers


Download Old Sample Papers of any organization

Education Details/Graduation Details

We look for the risk-takers, the collaborators, the inspired and the inspirational. We want the people who are brave enough to work at the cutting edge and create solutions that will enrich and improve the lives of people across the globe. So, if you want to make the world say wow, let's talk.


The conversation starts here. If this role matches your ambitions and skillset, let's get started with your application. Take a look at our other open positions too. Our many opportunities can lead to infinite possibilities.

Security Analyst, Identity & Access Management (IAM) Remote Worker - 2nd shift Reporting to the Manager of Identity & Access Management (IAM), the Sr. Security Analyst, IAM will contribute to the global expansion of the IAM program. This position will interface with SIE business units to understand and document their access requirements and propose solutions. The successful candidate will also help to develop operational processes for identity lifecycle management. Key Responsibilities: ● Operationally focused on o Data Quality - investigate and resolve missing identity attributes o Identity lifecycle management (joiner, mover, leaver) - ensure timely removal of access, generate access removal requests to IT, investigate and resolve suspicious account activity, investigate and resolve the status of affiliate user accounts o Access Certification - generate access removal requests to ensure timely removal of access o IAM Role management o Access Requests ● Collaborate with other analysts to support implementation of a secure IAM framework ● Assist in the development of new business processes and policies ● Collaborate on the delivery of multiple IAM-related projects and initiatives in a Scaled Agile environment, ensuring that new functionalities and integrations satisfy business need ● Analyze, document, and prioritize complex functional and technical requirements for the new IAM system components via a collaborative process of stakeholder/focus group engagement, data governance decisions, technical design reviews ● Develop approach and processes to maintain the accuracy of the identity and entitlements warehouse – consuming, organizing, assigning, and reporting on access ● Plan, configure, communicate, and execute on user access reviews to support SOX and PCI audit requirements ● Support the development of a comprehensive IAM program plan and project plans for the implementation and configuration of new IAM system components on premise and in the cloud (e.g. Workday, AD, AWS, Azure) ● Partner with business to educate and influence decisions to support the IAM program Qualifications: ● Ideal candidate will have 0-2 years of experience working within the information security operations and/or identity management disciplines ● Strong knowledge and experience in in cloud technologies (e.g. AWS & Azure IAM) ● This ideal candidate will have excellent written and oral communication skills, as well as interpersonal skills including the ability to articulate to both technical and non-technical audiences. The ideal candidate will be exceptionally self-motivated and organized ● Experience in creating test plans and developing test cases ● Successful candidate brings excellent analytical, evaluative, and problem-solving abilities ● Has extensive knowledge of identity management tools (e.g. Saviynt, RSA, SailPoint, CA, Oracle), technology, RBAC methodologies, policies and processes ● Excellent data analysis skills using Microsoft Excel & Access ● Must have the ability to work independently and multi-task effectively ● Experience with PCI and SOX programs ● Good understanding of Directory services (e.g. AD, openLDAP) ● Knowledge of Authentication/Authorization concepts of databases, servers, and applications ● A bachelor’s degree in Computer Science, IT or Information Security ● Security industry certifications are a plus


Minimum Percentage Required –

All are eligible


Mandatory to join whatsapp group for regular job updates


What they want from u??

We look for the risk-takers, the collaborators, the inspired and the inspirational. We want the people who are brave enough to work at the cutting edge and create solutions that will enrich and improve the lives of people across the globe. So, if you want to make the world say wow, let's talk.


The conversation starts here. If this role matches your ambitions and skillset, let's get started with your application. Take a look at our other open positions too. Our many opportunities can lead to infinite possibilities.

Security Analyst, Identity & Access Management (IAM) Remote Worker - 2nd shift Reporting to the Manager of Identity & Access Management (IAM), the Sr. Security Analyst, IAM will contribute to the global expansion of the IAM program. This position will interface with SIE business units to understand and document their access requirements and propose solutions. The successful candidate will also help to develop operational processes for identity lifecycle management. Key Responsibilities: ● Operationally focused on o Data Quality - investigate and resolve missing identity attributes o Identity lifecycle management (joiner, mover, leaver) - ensure timely removal of access, generate access removal requests to IT, investigate and resolve suspicious account activity, investigate and resolve the status of affiliate user accounts o Access Certification - generate access removal requests to ensure timely removal of access o IAM Role management o Access Requests ● Collaborate with other analysts to support implementation of a secure IAM framework ● Assist in the development of new business processes and policies ● Collaborate on the delivery of multiple IAM-related projects and initiatives in a Scaled Agile environment, ensuring that new functionalities and integrations satisfy business need ● Analyze, document, and prioritize complex functional and technical requirements for the new IAM system components via a collaborative process of stakeholder/focus group engagement, data governance decisions, technical design reviews ● Develop approach and processes to maintain the accuracy of the identity and entitlements warehouse – consuming, organizing, assigning, and reporting on access ● Plan, configure, communicate, and execute on user access reviews to support SOX and PCI audit requirements ● Support the development of a comprehensive IAM program plan and project plans for the implementation and configuration of new IAM system components on premise and in the cloud (e.g. Workday, AD, AWS, Azure) ● Partner with business to educate and influence decisions to support the IAM program Qualifications: ● Ideal candidate will have 0-2 years of experience working within the information security operations and/or identity management disciplines ● Strong knowledge and experience in in cloud technologies (e.g. AWS & Azure IAM) ● This ideal candidate will have excellent written and oral communication skills, as well as interpersonal skills including the ability to articulate to both technical and non-technical audiences. The ideal candidate will be exceptionally self-motivated and organized ● Experience in creating test plans and developing test cases ● Successful candidate brings excellent analytical, evaluative, and problem-solving abilities ● Has extensive knowledge of identity management tools (e.g. Saviynt, RSA, SailPoint, CA, Oracle), technology, RBAC methodologies, policies and processes ● Excellent data analysis skills using Microsoft Excel & Access ● Must have the ability to work independently and multi-task effectively ● Experience with PCI and SOX programs ● Good understanding of Directory services (e.g. AD, openLDAP) ● Knowledge of Authentication/Authorization concepts of databases, servers, and applications ● A bachelor’s degree in Computer Science, IT or Information Security ● Security industry certifications are a plus


Last Date to Apply - ASAP


Download java/python/android/web projects for free


Free Tutorials by Fresher Side – Click Here

Link is given below, Apply Soon before it expires.

All you need is your resume/cv for applying & linkedin profile(optional)


Apply Now




It Is always good to have your personal website also

Follow us on More Together – Facebook for regular updates

Visit our website


Note:- If you successfully cleared their screening process, only then you will receive the call/invitation letter for further rounds.

In rest cases acknowledgement may or may not comes. Totally varies from organization to organization.


To increase your chances for selection

1. Must a good resume that showcase your skills via projects/internships/volunteering.

2. A well maintained LinkedIn Profile with some certifications included.

3. Great to have own portfolio website that describes you in detail.






69 views0 comments

Related Posts

See All

Zoho Hiring | Software Developer

Organization Name & Details – Zoho Job Position/Designation- Software Developer Join us on LinkedIn – Great Place of Networking Work Location/Company Headquators- Banglore, India Mandatory to join Tel

Front End Developer || Synco Next is Hiring

Organization Name & Details – Synco Next Job Position/Designation- Front End Developer Join us on LinkedIn – Great Place of Networking Work Location/Company Headquators- Banglore, India Mandatory to j

Velotio is Hiring | Software Engineer | 2019 - 2021

Organization Name & Details – Velotio Job Position/Designation- Software Engineer ( Entry - Level ) Join us on LinkedIn – Great Place of Networking Work Location/Company Headquators- Pune Mandatory to

  • Facebook
  • Instagram
  • LinkedIn
  • 1024px-Telegram_logo.svg
  • download
  • YouTube
  • Google Play