This position is no longer open for applications

Senior Identity Access Management Analyst – Active Directory

Senior Identity Access Management Analyst – Active Directory (NP-IAMAD) City of London, England

Salary: GBP50000 - GBP60000 per annum
Senior Identity Access Management Analyst – Active Directory Services

My multi-national retail client requires a Senior Identity Access Management Analyst / Active Directory Services Specialist to join them on a permanent basis working in their offices in London. This opportunity is paying up to £60K for the right person.

As an Identity & Access Management Senior Analyst with a strong technical background on Active Directory Services, you will be part of the team that is helping to build and manage a new security platform. The Identity & Access Management platform will change the way customers get access to internal systems and data. The team are big users of Microsoft Active Directory and love things like identity lifecycle processes, role-based access, authentication, authorisation and accounting, privileged account management and enhanced authentication. They are also passionate about protecting colleagues.

The Role Detail :
An exciting opportunity has arisen for a Senior IAM Analyst with excellent Active Directory Services knowledge and expertise to join the Identity and Access Management Team in Cyber Security. This technical role will require experience in providing governance, support and maintaining Directory technologies on an Enterprise scale.

Reporting to the Identity & Access Platform Lead, this role is all about making sure every customer and Third Party have the appropriate levels of access; maintaining Active Directory Services to the required security standards, adopting industry best practices, troubleshooting and analyzing Active Directory issues.

You will need to operate at several different levels: from helping to build out the new IAM platform with the IAM Lead, working alongside colleagues in the Infrastructure Architecture and Engineering teams, implementing automation for provisioning/de provisioning of identities and access, creating workflow orchestration to improve efficiency and monitoring how data and systems are being accessed.

A key success criteria is the ability to operate successfully in an Agile environment in which much of the end-to-end accountability sits within individual infrastructure, operations and software teams.

Responsibilities:

• Overall management of the company’s Identity Repositories, primarily Microsoft Active Directory Services
• Governance, support and maintenance of Active Directory Services to the industry best practices and security standards
• Authentication – lead the successful migration from old authentications methods to SAML/LDAPS,etc
• Design and implement Workflow Orchestration for improving User Life Cycle Management - auto provisioning and de- provisioning, including assignment of RBAC
• Implement continuous improvements in securing and hardening of domains in active directory as well as driving business adoption where required
• Coaching and development of other IAM Analysts
• Work as a key point of contact for IAM related issues through escalation as a result of a security incidents

Key KPIs:

• Design and implement Power BI dashboards to monitor and report on User Life Cycle Management activity
• Implement efficient processes for monitoring and addressing dormant accounts as per agreed KPI.s
• Action IAM related tickets that are raised on the Service Now portal within agreed business SLAs

Technical Skills / Experience:

Experience with Microsoft Active Directory and Group Policy in a large enterprise environment required

Experience with Azure AD including;
• FIM/MIM and Active Directory (including RBAC/ABAC and delegation models)
• Azure Active Directory Connect
• Azure Active Directory provisioning service
• Access certification
• Azure Active Directory application roles and scopes

Experience in Privilege Access management
• Active Directory Tiering model and LAPS

Experience in supporting protocols for provisioning/authorisation and authentication
• SCIM
• OpenID connect and OAUTH 2
• SAML
• Kerberos and SPNEGO
• NTLM

Experience setting up SAML Authentication in Azure AD (or ADFS)
Experience in PowerShell scripting
Experience troubleshooting advanced Active Directory issues
Experience in Management of Service Accounts
Experience with MS Azure Infrastructure
Experience with MS Windows 2008R2 onwards server and server core
Experience with Network Policy Server (RADIUS)
Knowledge of Active Directory Red Forest/Bastion Forest design principles
Broad infrastructure knowledge around network, storage, network and security
Analytical, problem solving and detail-oriented
Collaborate, share and actively listen
Love to learn by doing
Strong communication and presentation skills

Please apply to Nayanie.pillai@gibbshybrid.com


;