ProViso Consulting
Summary Of Day To Day Responsibilities:
• We are seeking a highly skilled Sr.Information Security Analyst to join our team.
• This role combines business systems analysis with a strong focus on information security practices.
• The ideal candidate will bring a solid background in Identity and Access Management (IAM), along with expertise in analyzing, designing, and implementing secure systems and processes. You will play a key role in bridging the gap between business and IT by ensuring security measures align with organizational goals and compliance requirements.
Key Responsibilities
• Business Systems Analysis
• Collaborate with stakeholders to understand business needs, translate requirements into technical solutions, and ensure alignment with security policies.
• Analyze and document workflows, processes, and systems to identify potential security risks.
• Develop detailed technical and functional specifications for new security solutions or system enhancements.
Identity and Access Management (IAM)
• Manage IAM systems, ensuring appropriate access controls and role-based access policies are in place.
• Oversee user provisioning, de-provisioning, and authentication processes.
• Assess / identify key issues and escalate to appropriate levels and relevant stakeholders where required.
• Participate in business specific / cross-functional / enterprise initiatives as a subject matter expert helping to identify risk / provide guidance.
• May develop / provide / contribute to complex reporting, analysis, and assessments at the functional or enterprise level
• Adhere to and advise on / oversee / monitor / enforce enterprise frameworks and methodologies that relate to technology controls / information security activities
• Define / develop / implement / manage standards, policies, procedures, and solutions that mitigate risk and maximize security, availability of service, efficiency and effectiveness
Must have
• 5+ years of combined experience in information security and business systems analysis.
• Strong understanding of Identity and Access Management (IAM) principles, tools, and best practices.
• Experience with IAM technologies such as Ping Identity or similar.
• Familiarity with network protocols, firewalls
• Experience in translating business needs for low-latency, high-availability, and performing micro-services type of applications
Nice to have
• Certifications such as CISSP, CISM, Security+, or ITIL.
• Experience with cloud platforms (AWS, Azure, or GCP) and integrating security controls.
• Proficiency in scripting or automation (e.g., Python, PowerShell).
• Knowledge of database management