Apply now »

Senior Information Security Analyst - Identity and Access Management (IAM)

128331

Job Description

The Information Security Analyst’s role is to support the organization’s identity and access management (IAM) program & services for APAC region with collaboration with other global regions. Candidates will need to be analytical, ethical, reflect professional attitude, & passionate for learning.

  • Administer users, accounts, and access privileges in the organization’s identity management system to ensure that the right subjects have access to the right resources with set rules.
  • Responsible for administration of IAM system requests.
  • Involved in identifying, troubleshooting, and resolving IAM issues.
  • Participate and run IAM initiatives, projects, and delivery as per agreed timeline.
  • Work with internal customers, business analysts, application teams and IT Support to understand requirements for access management projects.  
  • Work with the extended IAM team members in other countries for delivering service.
  • Maintain updated documentation for the IAM program.
  • Engage in IAM control assessment, audits and evidence gathering.
  • Review access control processes and reports to identify potential risks & gaps. Remediate these within agreed timeline.
  • Provide awareness, guidelines, training to new & existing users on the IAM system.
  • Update and maintain the IAM system & process according to changes in the organization’s business needs.

 

Job Duties

The duties of an Information Security Analyst (IAM) include the following:

  • Managing accounts and permissions in the identity and access management system.
  • Granting or denying access to company resources based on user role and privileges.
  • Creating and managing users, roles, accounts & groups in the identity and access management system through approved request and change management process.
  • Enforcing policies and procedures related to identity and access management.
  • Monitoring unauthorized activity in the identity and access management system using logs.
  • Generate reports on identity and access management system activities.
  • Identifying and resolving identity and access management issues.
  • Maintaining up-to-date knowledge of identity and access management best practices.
  • Documenting IAM processes and procedures for wider team reference.
  • Proactively identify control gaps within access management process and perform continuous improvements using technologies and process automation.

 

Job Qualifications

  • Bachelor’s degree in computer science, information technology, or related field.
  • At least three to four years of experience in Identity and Access Management, Information Security or Information Technology related fields.
  • Candidates without enough years of experience or from different field may apply if they have completed any Information Security Certifications or Certificates or self-learning commitment through online courses.

Examples of Certifications or Self-Learning (Vendor Neutral):

  1. Microsoft Security, Compliance and Identity Fundamentals (SC-900)
  2. Microsoft Azure Fundamentals (AZ-900)
  3. Microsoft: Identity and Access Administrator Associate (SC-300).
  4. Microsoft Windows Active Directory Fundamentals
  5. ISACA - IT Audit, IT Risk or Cybersecurity Fundamentals Certificate
  6. (ISC)² Certified in Cyber Security (CC) or (ISC)² SSCP
  7. CompTIA IT Fundamentals (ITF+) or CompTIA Security+
  8. Or GISF Information Security Fundamentals (GISF)
  • Familiarity with Access Control concepts, Security Principles, Compliance and Security best practices.
  • Understand security principles like CIA Triad (confidentiality, integrity, and availability), authentication vs authorization, Identity and Access Lifecycle (provisioning, modification, termination, access review)
  • Excellent verbal communication and written communication skills.
  • Strong analytical, attention to details and problem-solving skills.
  • Good organizational and project administration skills.
  • Dynamic and able to adapt to needs of organization and business.
  • Ability to work individually and collaborate as part of a team to deliver set objectives.
  • Positive attitude, passionate for improvements and self-initiated to learn.

 

Technical Skills

  • Familiarity with operating systems (Windows, UNIX/Linux, etc.)
  • Strong understanding directory services (LDAP, Microsoft Active Directory - Account Types, Security Groups, Objects, Attributes, Containers, etc), Azure Active Directory and supporting tools such as Microsoft PowerShell (scripting & running).
  • Knowledge of security protocols (SSH, TLS, SAML, etc.)
  • Proficient in at least one scripting or programming language (PowerShell, SQL, etc.)
  • Experience with any one of IAM & PAM tools (Ping Identity, SailPoint, Oracle Identity Governance, Okta, CyberArk, IBM Security Verify, ForgeRock, etc.)
  • Experience using ITSM Tools such as Service Now, BMC Remedy, ZenDesk etc for incident, request and change management.
  • Familiarity with database concepts and relational databases such as Microsoft SQL or Oracle Database.
  • Proficient using Microsoft Excel spreadsheets and other apps under Microsoft 365 application suites.

 

Job Expectations

  • Understand and be able to articulate the Organisation IAM policy & team IAM strategy.
  • Adhere to IAM metrics and KPIs to track progress and measure success.
  • Understand the various IAM tools and technologies available and be able to recommend solutions that will meet the organisation and business needs.
  • Be able to participate and manage IAM projects, including developing project plans within team area of delivery, requirement gathering and managing timelines for completion.
  • Be able to troubleshoot IAM issues and develop creative solutions to solve problems.
  • Have a strong understanding of security concepts and how they relate to IAM.
  • Be able to deliver IAM training to both technical and non-technical staff.
  • Perform research, self-learn with various resources and stay up to date on IAM trends and information security best practices.
  • Work effectively with Business and other IT team members to ensure that IAM process & solutions are integrated seamlessly into the overall IT infrastructure.

 

You are the heart & soul of Zurich! 
 

At Zurich, we like to think outside the box and challenge the status quo. We take an optimistic approach by focusing on the positives and constantly asking What can go right? 

We highly value the experience and know-how of our employees and offer a wide range of opportunities across business areas to encourage you to apply for new opportunities within Zurich when you are ready for your next career step. 

 

Let’s continue to grow together!

  • Location(s):  MY - Kuala Lumpur 
  • Schedule: Full Time

Apply now »