*Req: Identity and Access Management Analyst @ KS*




*POSITION SUMMARY DESCRIPTION: *

This position provides functional support across the Identity and Access
Management (IAM) environment including managing the full life cycle of
identities throughout Information Technology systems.   The individual will
work closely with implementation groups, system analysts, system
administrators, business stakeholders and functional teams in supporting
and administering applications and systems to enable the strategic goals of
the business.





*POSITION COMPETENCIES: *

   - Work with other technology resources to configure and implement IAM
   products and risk mitigation.
   - Help design and develop automated provisioning and reconciliation of
   IT resources.
   - Request-based application and resource provisioning.
   - Role Based Access Control (RBAC) authentication to entitled
   applications and resources
   - Role based resolution of approvers for request approval flows.
   - Produce and maintain clear and concise documentation throughout the
   design, development, and rollout phases of implementation and provide
   operational staff with procedural documentation. Educate and collaborate to
   facilitate the smooth transition of new services from development to
   production.
   - Performs distribution and analysis of IAM enterprise reporting.
   - Proactively identifies and implements process improvement
   opportunities.
   - Interprets and applies KCP&L policies, procedures and audit results to
   ensure IAM departmental compliance.
   - Holds functional execution responsibility for access management
   processes (onboarding, access request, job change, termination, access
   review, rogue account detection)
   - Develops metrics to gauge and evaluate the performance of access
   management processes (provisioning, deprovisioning, access reviews) and
   personnel
   - Manage the full lifecycle of access for KCP&L employees and
   contractors to physical and cyber systems.
   - Troubleshoots access provisioning and deprovisioning errors and
   process execution failures.
   - Ensure compliance with applicable NERC CIP identity and access
   management requirements
   - Respond to compliance data gathering requests and investigations
   - Ensure compliance with applicable SOX identity & access management
   requirements





*RESULTS EXPECTED:*

   - Working with the Functional owner of access management, evaluate
   current IAM tool and determine as-is and to-be state.  Design maturity
   steps for existing tool and/or determine path to new solution.
   - Process deconstruction, process mapping, process design
   - Works with IT, HR and Corporate Security Access Control Procedures.
   - Works with the company to define critical areas and the proper
   Physical Security Controls relative to Compliance.
   - Ability to create, revise, and update departmental procedures.





*REQUIREMENTS *

   - Bachelor Degree preferred or experience commensurate with job
   responsibilities.
   - Experience with a broad range of operating systems and application
   platforms: Microsoft Windows desktop and servers O/S’s.
   - Strong background in application system design and security
   architecture.
   - Experience with MS Active Directory and Linux.
   - Experience in design and implementation of IAM solutions.
   - Developing business processes and maps.
   - Experience in designing requirements for application systems and
   policy compliance.
   - Skilled in customer service, communication, and operational excellence.





*OTHER DESIRED TRAITS*:

   - CyberArk for password vaulting experience
   - MS SCSM experience
   - Team Track experience
   - Courion Access Request Manager experience
   - Support identity and access management processes in large regulated
   environment (Contractor Management, joint-movers-leavers, access reviews,
   and compliance reporting)
   - Leading technology project deployments as project manager
   - Leading technology project deployments as technical lead
   - Experience analyzing and developing role-based acces
   - Prior CIP V5 experience, CISC certification, CISA certification





-- 

*Thanks + Regards,*


*George,*


*("Call ME only if your emails are  unanswered"),*

*347-815-4828,*

*G-talk / YIM/ Skype**: George.humanresource*

[image:
https://www.linkedin.com/in/george-lazarus-59b55763?trk=profile-badge'>George
Lazarus</a></div>]
<https://www.linkedin.com/in/george-lazarus-59b55763?trk=profile-badge'%3EGeorge+Lazarus%3C/a%3E%3C/div%3E>

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at https://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to