Job Title: IAM Analyst
Salary Package: Up to 6 LPA
Company Name: Sony
Job Location: Bangalore
Qualification: Graduate
Job Info:
We look for the risk-takers, the collaborators, the inspired and the inspirational. We want the people who are brave enough to work at the cutting edge and create solutions that will enrich and improve the lives of people across the globe. So, if you want to make the world say wow, let’s talk.
The conversation starts here. If this role matches your ambitions and skillset, let’s get started with your application. Take a look at our other open positions too. Our many opportunities can lead to infinite possibilities.
Job Description
Sr. Security Analyst, Identity & Access Management (IAM)
Remote Worker – 2nd shift
Reporting to the Manager of Identity & Access Management (IAM), the Sr. Security Analyst, IAM will
contribute to the global expansion of the IAM program. This position will interface with SIE business units
to understand and document their access requirements and propose solutions. The successful candidate
will also help to develop operational processes for identity lifecycle management.
Key Responsibilities:
● Operationally focused on
o Data Quality – investigate and resolve missing identity attributes
o Identity lifecycle management (joiner, mover, leaver) – ensure timely removal of access,
generate access removal requests to IT, investigate and resolve suspicious account
activity, investigate and resolve the status of affiliate user accounts
o Access Certification – generate access removal requests to ensure timely removal of
access
o Connector and Reports validation
o Access Requests and Role Management
● Collaborate with other leads to support implementation of a secure IAM framework
● Assist in the development of new business processes and policies
● Collaborate on and lead the delivery of multiple IAM-related projects and initiatives in a Scaled
Agile environment, ensuring that new functionalities and integrations satisfy business need
● Lead team and individual efforts to analyze, document, and prioritize complex functional and
technical requirements for the new IAM system components via a collaborative process of
stakeholder/focus group engagement, data governance decisions, technical design reviews
● Develop approach and processes to maintain the accuracy of the identity and entitlements
warehouse – consuming, organizing, assigning, and reporting on access
● Plan, configure, communicate, and execute on user access reviews to support SOX and PCI
audit requirements
● Support the development of a comprehensive IAM program plan and project plans for the
implementation and configuration of new IAM system components on premise and in the cloud
(e.g. Workday, AD, AWS, Azure)
● Partner with business leaders to educate and influence decisions to support the IAM program
● Liaison between impacted business stakeholders and infrastructure teams
Qualifications:
● Ideal candidate will have 4-6 years of experience working within the information security
operations and identity management disciplines
● Knowledge and experience in in cloud technologies (e.g. AWS & Azure)
● This ideal candidate will have excellent written and oral communication skills, as well as
interpersonal skills including the ability to articulate to both technical and non-technical
audiences. The ideal candidate will be exceptionally self-motivated and organized
● Experience in creating test plans and developing test cases
● Successful candidate brings excellent analytical, evaluative, and problem-solving abilities
● Has extensive Technical knowledge of identity management tools (e.g. Okta, Saviynt, RSA, SailPoint, CA,
Oracle), RBAC methodologies, policies and processes
● Excellent data analysis skills using Microsoft Excel & Access
● Must have the ability to work independently and multi-task effectively
● Experience with PCI and SOX programs
● Good understanding of Directory services (e.g. AD, openLDAP), Databases (Oracle, MYSQL etc) and SQL
● Knowledge of Authentication/Authorization concepts of databases, servers, and applications
● A bachelor’s degree in Computer Science, IT or Information Security
● Security industry certifications are a plus