Level 2 support for all Identity Access Management related i----------- and service requests
Performs configuration of security policies and rules for integrating IAM best practice with other products in various deployment environments based on requirement.
Responds to any client/support inquiries for assistance with any access related concern governing IAM
Assists the IAM Analyst with any project and implementation
Maintains all necessary runbooks and documents and maintains a good understanding of IAM service offerings and processes
IAM Analyst Job Description
The IAM analyst’s role is to support the organization’s identity and access management program. Here are common tasks listed in an IAM analyst job description:
Administer user accounts and access privileges in the organization’s identity management system.
Work closely with the IAM team to ensure that the right people have access to the right resources.
Responsible for the day-to-day administration of the IAM system.
Involved in troubleshooting and resolving IAM issues.
Participate in IAM projects and initiatives.
Work with internal customers, business analysts, and application teams to understand access requirements.
Maintain documentation for the IAM program.
Participate in IAM audits and review access control reports to identify potential risks.
Provide training to new users on the IAM system.
Update and maintain the IAM system according to changes in the organization’s business needs.
IAM Analyst Job Duties
The duties of an IAM analyst may include the following:
Managing user accounts and permissions in the identity and access management system.
Granting or denying access to company resources based on user role and privileges.
Creating and managing user groups in the identity and access management system.
Enforcing company policies and procedures related to identity and access management.
Monitoring user activity in the identity and access management system.
Reporting on identity and access management system activity.
Identifying and addressing identity and access management issues.
Working with the IAM team to resolve identity and access management problems.
Maintaining up-to-date knowledge of identity and access management best practices.
Documenting IAM processes and procedures.
IAM Analyst Job Qualifications
The qualifications for an IAM analyst vary depending on the company, but most companies require at least a bachelor’s degree in computer science, information technology, or a related field. Some companies may also require professional identity and access management certification, such as the Certified Access Management Specialist (CAMS) certification from the Identity Management Institute. Here are some of the qualifications that are commonly required in an IAM analyst job description:
Bachelor’s degree in computer science, information technology, or a related field.
At least two years of experience in identity and access management or a related field.
Excellent communication and project administration skills.
Strong analytical skills.
Good organizational skills and attention to detail.
Familiarity with IAM concepts and best practices.
Knowledge of IAM software, such as Microsoft Active Directory.
Proficient in using spreadsheets and word processing software, such as Microsoft Excel and Microsoft Word.
Familiarity with database concepts and relational databases, such as Microsoft SQL Server.
Ability to work individually and as part of a team.
Types of Reports Prepared by an IAM Analyst
1. Access Request Report
This report details all access requests made by users in the organization. You should include information such as the date of the request, the user’s name and department, the type of access requested, and whether or not the request was approved.
2. User Provisioning Report
This report details all user provisioning activities within the organization. You should include information such as the date of the provisioning, the user’s name and department, the type of access provisioned, and whether or not the provisioning was successful.
3. Audit Report
This report details all IAM-related audits that have been conducted within the organization. You should include information such as the date of the audit, the type of audit performed, the audit’s scope, and the audit’s findings.
4. IAM Strategy Report
This report provides an overview of the company’s IAM strategy, including the goals and objectives of the strategy, the tools and technologies that will be used, the timeline for implementation, and the budget for the project.
5. User Authentication Report
This report details all user authentication activities within the organization. You should include information such as the date of the authentication, the user’s name and department, the type of authentication used, and whether or not the authentication was successful. Failed authentication attempts are also reported and investigated to prevent a potential breach.
6. Password Reset Report
This report details all password reset activities within the organization. You should include information such as the date of the reset, the user’s name and department, and whether or not the reset was successful.
7. Authorization Report
This report details all authorization activities within the organization. You should include information such as the date of the authorization, the user’s name and department, the type of authorization requested, and whether or not the authorization was approved.