6 to 10 Years Relevant Experience
We are seeking a Senior Business Analyst with deep expertise in Identity and Access Management (IAM) and Identity Governance and Administration (IGA) to lead the analysis, design, and implementation of enterprise IAM/IGA solutions. This role requires strong domain knowledge in IAM governance, control ownership, and cross-functional collaboration to deliver secure, scalable, and user-centric identity services.
Key Responsibilities:
- Collaborate with IAM Architects, Product Owners, Engineers, and senior stakeholders to elicit, define, and validate business and technical requirements for IAM/IGA capabilities.
- Drive the delivery of IAM/IGA programs by translating business needs into actionable user stories, process designs, and integration requirements.
- Develop and maintain end-to-end process flows, control documentation, and governance frameworks for identity lifecycle management, access provisioning, and policy enforcement.
- Support system integration, user adoption, and training initiatives for new IAM services including authentication, access reviews, role modeling, and certification processes.
- Assist in defining and tracking IAM performance metrics, usage statistics, and control effectiveness reports for internal governance and audit purposes.
- Contribute to ongoing IAM maturity assessments, gap analysis, and continuous improvement roadmaps.
Required Skills & Qualifications:
- 7+ years of experience as a Business Analyst with a focus on IAM/IGA domains.
- Strong understanding of IAM governance, identity lifecycle management, role-based access control (RBAC), and policy enforcement.
- Experience with leading IAM platforms such as SailPoint, Okta, CyberArk, ForgeRock, or Ping Identity is preferred.
- Ability to create detailed documentation including BRDs, FRDs, process maps, training materials, and governance models.
- Familiarity with compliance standards such as SOX, GDPR, HIPAA, NIST, or ISO 27001.
- Excellent communication, stakeholder engagement, and analytical skills.
- Bachelor’s or Master’s degree in Information Technology, Cybersecurity, or related field.
Nice-to-Have:
- Certifications such as CISM, CISSP, CRISC, or Certified Business Analyst Professional (CBAP).
- Experience working in Agile/Scrum environments.
- Exposure to access certifications, Segregation of Duties (SoD) controls, and audit readiness initiatives.