إرفاق
الوصف الوظيفي
|
2. Job Purpose |
|
Implement comprehensive cybersecurity measures, including authenticating users via MFA, establishing access policies, developing roles, deploying SSO, managing privileged access, managing bring your own device (BYOD), conducting regular reviews, adjusting provisioning processes, suggesting effective password policies, educating users, and crafting breach response procedures to ensure compliance and enhance overall cybersecurity for IT & OT. |
|
3. Position Accountability Description |
|
Access Management and Authentication
1. Prepare and manage Multi-Factor Authentication (MFA) by requiring users to verify their identity through multiple methods, incorporating token-based and behavioural biometrics, and continuously updating methods to counteract emerging threats. 2. Execute the creation, modification, and deactivation of user accounts, assign permissions based on role-based criteria, conduct periodic reviews, and implement immediate deactivation for terminated accounts. 3. Formulate and enforce comprehensive access control policies detailing access to specific resources, using automated tools to detect violations, and maintaining detailed audit logs. 4. Develop organizational roles with clear access requirements, assign users accordingly, and regularly review and update roles to reflect organizational changes. 5. Implement Single Sign-On (SSO) for multi-application access, establish identity federation, and use secure protocols to enhance user experience and efficiency. 6. Develop and implement access management processes and procedures applicable to securing the DACO environment, 7. identifying and mitigating compliance risks across all business workflows. 8. Perform daily health checks for the access management system, review user access reports, and work with business units to administer employee access roles effectively. 9. Develop and prepare metrics to represent the status of the Identity Management program, 10. Establishing requirements and standards for Identity and Access Management (IAM). 11. Participate in information security risk assessments as needed, and define, establish 12. Maintaining the Identity & Access Management (IAM) solutions architecture holistically, covering technology, processes, and people. 13. Execute identity and role management based on the approved Segregation of Duties (SOD) business matrix, ensuring accurate and compliant access control. 14. Prepare updates and reports for Cybersecurity Identity & Access Management (IAM) management, ensuring transparency in program performance. 15. Comply with all DACO policies and procedures, including safety protocols and reporting hazards.
Privileged Access Management and Security
16. Provide secure Privileged Access Management (PAM) solutions, use Just-In-Time (JIT) access, record and audit privileged sessions, and enforce robust authentication methods. 17. Undertake regular reviews of user access rights, require periodic manager certification, assess access-related risks, and ensure compliance through thorough review processes. 18. Adapt user provisioning, de-provisioning, and role changes using identity governance tools, enforce access control policies, and maintain segregation of duties. 19. Monitor the usage of highly sensitive and privileged accounts accessed by multiple users to ensure proper cybersecurity and control. Password Management and User Education
20. Recommend complex passwords, enforce regular expiration and history checks, provide tools to gauge password strength, and encourage better password practices. 21. Inform users about cybersecurity through regular training sessions, phishing simulations, and guidelines on creating strong passwords and recognizing phishing attempts.
Incident Response and Monitoring
22. Create and maintain detailed response procedures for IAM cybersecurity incidents, coordinate with IT and cybersecurity teams, regularly test and update the incident response plan, and conduct training exercises. 23. Develop advanced monitoring tools to detect unusual access behaviors in real-time, configure alerting mechanisms, and use machine learning algorithms for accurate threat detection. 24. Ensure all access events are logged and stored securely, implement detailed audit trails, regularly review logs, and use log data for forensic analysis.
Vulnerability Assessment and Identity Proofing
25. Develop and conduct regular vulnerability assessments for IAM systems, hire third-party experts for penetration testing, promptly address vulnerabilities, and document remediation efforts. 26. Implement robust identity proofing measures during account creation and access requests, integrate verification processes with government-issued IDs and biometric data, and continuously improve these processes.
Third-Party Integration and Infrastructure Security
27. Develop and enforce cybersecurity standards for integrating third-party applications with IAM systems, use secure APIs, conduct cybersecurity reviews, and monitor third-party access. 28. Review and strengthen IAM infrastructure components, apply security patches, implement advanced cybersecurity measures, and conduct periodic cybersecurity assessments.
Industry Trends and Best Practices
29. Analyze industry trends and best practices in access control and identity management, use data to identify improvement areas, update cybersecurity policies, and collaborate with cybersecurity teams to align IAM strategies with cybersecurity goals.
Team Collaboration and Learning
30. Collaborate with team members to share knowledge, provide support, and actively participate in activities to foster a positive and productive work environment. 31. Pursue continuous learning by seeking feedback, attending training sessions, and staying updated on industry trends to enhance personal skills and knowledge. |
المهارات
In-depth knowledge of identity and access management (IAM) principles
- Proficiency in implementing and managing IAM solutions
- Familiarity with cybersecurity best practices and standards
- Strong understanding of security protocols and technologies
- Ability to identify and mitigate security risks
- Experience in conducting security assessments and audits
- Excellent problem-solving and analytical skills
- Strong communication and interpersonal abilities
- Ability to work effectively in a team environment
- Certification in relevant cybersecurity and IAM technologies (e.g., CISSP, CISA, CISM)
تفاصيل الوظيفة
المسمى الوظيفي
Cybersecurity IAM Sr Analyst
مكان الوظيفة
المملكة العربية السعودية
الدور الوظيفي
تكنولوجيا المعلومات
المرشح المفضل
المستوى المهني
مبتدئ الخبرة