65% IAM Policy Analysis, Documentation, and Implementation
- Document and analyze existing IAM processes, workflows, and policies that are implemented in the current IET IAM toolset.
- Develop and document information security policy requirements that apply to the IAM platform to comply with university business and security policies.
- Develop and document IAM policy specifications including business roles and access entitlements.
- Develop and document IAM business process workflow specifications.
- Develop and document IAM functional specifications encompassing data models, workflows, data manipulation, screen layouts, and user interactions.
- Develop automation of policies and business rules within the IAM tools.
35% IAM Business and Security Policy Requirement Development
- Work with internal customers, business analysts, and application teams to understand current access requirements and policies.
- Work with cross-functional teams to conduct requirement and data analysis that inform IAM policies and guidelines.
- Work with Information Security to understand security standards and policies (e.g. IS-3) and translate into technical IAM policies as applicable.
- Participate in IAM audits and review access control reports to identify potential risks. Develop IAM reports in support of security audits.