recruiting for a Cyber Security and Identify and Access Management Consultant. Contract role until December 2025 of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and implement user access controls and identity and access management systems Monitor network and application performance system, and application user access control procedures and feedback to management to update policies and processes Distribute access control reports to support periodic reviews Provide required Management Information
Candidate must have strong I.T. knowledge in Access Management, Change Management, IT Operations, IT Risk controls, attestation, and direct access to data. Change Management: Establish and manage policies and configuration, account management, access control, vulnerability management, audit log management, email and controls, attestation, and direct access to data. Change Management: Establish and manage policies and configuration, account management, access control, vulnerability management, audit log management, email and
of experience in IT security, Identity and Access Management (IAM), DLP experience, Cloud Security and implement user access controls and identity and access management systems
Charter
and Access Management (IAM), Security Groups, Network Access Control Lists (NACLs), Key Management Service best practices, including AWS Identity and Access Management (IAM), AWS Security Hub, AWS Config, and AWS
Advantageous: Identity and Access Management. Privileged Access Management (CyberArk, BeyondTrust, or
Internet access. Managing Access Control systems including: Access Control System management/maintenance
principles of need to know, least access and minimum risk. Design and manage process of IAM risks (e.g. Access document. DevOps SAP GRC Access Control Improve current services for Superuser Management and Access Risk Analysis Thorough understanding of IAM (Identity and Access Management) processes Good knowledge of IAM related technologies
the auditor:
Access Management:
Latest Final Signed-off Access
reporting and reviewing of direct access.
Change Management and Systems Development:
between the company and service providers. User Access Management: Manage user access and permissions within