This position/role exists to:The Identity & Access Management Analyst is part of the Global Information Security organization. The ideal candidate will have basic knowledge of identity management concepts such as authentication, authorization, RBAC, and least privilege. This candidate will support access management projects and operational activities for essential business systems. Exposure to Active Directory and Microsoft Entra admin center is a plus. The analyst will support IAM policies and standards and assist business areas in defining and maintaining access management processes, and will work across Sylvamo to ensure execution of those operational processes. The analyst will report to the IAM Manager.The key customers of this position include but are not limited to:All Sylvamo employees and contractors in all facilities across all businesses that require network or systems access.External partners that access Sylvamo systems, such as customers or vendors.The key actions, outputs, deliverables, products and services include:Support IAM standards, lifecycle management, and other established operational processes.Partner with the key customers to meet service level agreements for Identity and Access Management.Work with application developers and IT operations to test, deploy and maintain enterprise-wide solutions.Work as part of a team to discuss and collaborate on ideas and solutions.Bring a positive attitude and willingness to adapt to a changing environment.Excellent time management skills, handling multiple priorities with individual deadlines.Willingness to serve as subject matter expert to troubleshoot and support issues.Participate in on-call rotation.Participate in meetings with business partners to educate and ensure adherence to corporate standards and policies.Provide analysis/validation of remediation actions taken, opportunities for improvements, and out-of-the-box thinking for optimizations and solving roadblocks.The key Accountabilities (outcomes) and Actions of this position include:Administration, maintenance and support of Sylvamo's Identity and Access Management technologies and services (end-to-end).Partner with business leaders on application integrations as it pertains to Identity & Access Management.Support the establishment and continuous improvement of Identity & Access Management processes to ensure day-to-day operational stability and security.Maintain applicable Enterprise Service Levels (SLAs) for the Identity & Access Management tower.Assist with developing technical requirements and documentation.Major/Primary Activities: Identity & Access Management; Application Integration; SSO Integration; Privilege Access Management; Identity Federation Technologies; Reporting; Monitoring; Metrics; Maintenance; Consultation; Design; Engineering.The external environment, including technology, competition, markets:• Proper visibility (and application within Sylvamo) of declining, current and emerging technologies.• Proper visibility of emerging threats and potential impact to Sylvamo.• Emergence of new Cyber-attack methods and techniques.• Proliferation of Ransomware and other opportunistic hacker advanced technologies.The internal environment, including interaction with others, (both inside and outside the company) policies/practices:• Participation of organizational stakeholders in incident response.• Transition of toolsets from the current service provider to new service provider.• Maturation of processes in Identity Management tools.The work itself, e.g., problems, opportunities, change:• Continued optimization and improvement of the Identity & Access Management space.Knowledge and Experience:Bachelor's Degree in Information Technology, Information Security/Assurance, Computer Science, Engineering, or related field of study, or any combination of relevant equivalent experience, education and training.3+ years of overall IT work experience.Basic understanding of Identity & Access Management and security-related technologies and services is a must.Understanding of a variety of technical concepts such as: Networking, systems administration, application development, cloud computing and information security best practices.Desirable Security Certification: CISM, GIAC, CISA or similar.Fluency in English.DIVERSIDADE:
#J-18808-Ljbffr