Lead Analyst

Job Locations IN-Bangalore
Job ID 2025-3726
# of Openings
1
Posted Date
9 hours ago(11/20/2025 2:27 AM)
Category
Technology

Overview

  • The candidate is expected to work in the privacy and compliance vertical within information security
  • The IAM analyst works closely with security and IT teammates to establish and manage a process of enterprise-wide identities and access controls granted to systems and applications
  • The analyst uses IAM tools and platforms to support and manage provisioning, de-provisioning, and exception changes, ensuring they are clearly tracked, reported and reviewed according to established policies
  • The candidate should have good communication and presentation skills, has ability to work well independently or with a team and is available to travel, possibly internationally on needed basis.
  • The candidate is able to implement and support continued use of automation wherever possible to improve efficiency and accuracy of identity and access management systems
  • Ability to think clearly and articulate your vision with the appropriate technical dept

Responsibilities

  •  Implement identity controls and settings that align with policies and governance structure.
  • Assess and resolve IAM issues that occur across the employee base, as well as with external entities.
  • Serve on a distributed security and technology team responsible for establishing and maintaining identities and entitlements within IAM solutions
  • Secure access to both on-prem and cloud infrastructure, as well as to applications required to support a distributed remote workforce
  • Evaluate business impact and risk exposure based on the level of access granted and make recommendations where improvements should be made.
  • Document access, policies and exceptions, and maintain integrity for audit reviews.
  • Review internal, external and contractor accounts as part of periodic audits.
  • Work closely with incident responders during potential incidents and escalate to management as needed.
  • Make recommendations for improvements in automation efficiencies, security practices and end-user experience.
  • Collaborate with Information Technology, Development and business team members to provide effective solution for same

Qualifications

  • Bachelor’s degree in information technology or computer science discipline
  • Minimum 3-4 years of experience in information security domain
  • Preferred experience with ISO 27001, HIPAA, SOC2, cloud security controls, internal audit, enterprise risk assessment and incident management program
  • Exposure to technology architecture such as network, servers, database, identity and access management (IAM) solutions, endpoint protection technologies and techniques
  • One or more of CISSP, GSEC, GISF, GCIA and GISP is preferable, but not required.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed