Key Responsibilities:
* Assess and document current-state IAM processes, KBs, and procedural controls impacted by the new model.
* Recommend improvements to align access management with security best practices.
* Develop clear communications to guide end-users through adoption and readiness.
* Engage stakeholders across operations, IT, and cyber teams to ensure buy-in and smooth implementation.
* Support logistics for security key/token deployment and related support processes.
This role sits at the intersection of cyber, IAM, and business operations, making strong stakeholder engagement and problem-solving skills essential.
A successful candidate will be a seasoned professional with expertise in Identity Access Management (IAM) solutions. The ideal candidate will possess a deep understanding of security best practices and experience in implementing large-scale IAM projects.
The Business Analyst will work closely with cross-functional teams to design and implement an Enterprise Access Model (EAM) that meets the organization's needs.