We are seeking an IAM (Identity and Access Management) Security Analyst to join our dynamic Security team.
The ideal candidate is detail-oriented, analytical, and proactive, with a strong understanding of identity security principles and technologies. You will be responsible for supporting and enhancing the IAM framework across the organization, ensuring secure and compliant access to systems and data.
This role involves overseeing the full identity lifecycle, including authentication and authorization mechanisms, and monitoring identity exposure risks. Your contributions will be essential in safeguarding digital identities and maintaining robust access controls across SCOR’s infrastructure.
As an IAM Security Analyst, you will be responsible for the design and operational support of IAM services. You will validate workflows, manage authentication and authorization processes, and ensure that identity governance aligns with organizational policies. You will also collaborate with IT and security teams to automate provisioning, monitor identity exposure, and enforce access controls.
Key Responsibilities:
Must adhere to our Key Security Principles and Team Values:
Security Principles: Defend the business, support the business, and promote responsible information security behavior.
Team Values: Professionalism, Ethics, Transparency, and Team Spirit.
Your expertise in IAM and Cyber Security will be key in supporting technical and functional teams to implement effective identity controls and mitigate evolving cyber threats.
Hard skills
Strong background in IAM and Cyber Security.
Experience with IAM tools and technologies (e.g., IGA, PAM, SSO, MFA).
Knowledge of identity lifecycle management and access control models.
Familiarity with OSINT tools for identity exposure monitoring.
Understanding of directory services and authentication protocols (LDAP, SAML, OAuth, etc.).
Knowledge in Microsoft Identity Goverance.
Soft skills
Strong analytical and problem-solving skills.
Effective communication and collaboration abilities.
Ability to work independently and in cross-functional teams.
Attention to detail and a proactive mindset.
Bachelor’s or Master’s degree in Computer Science, Cybersecurity, or a related field.