Senior Administrator Identity Access management
Send a job offer directly to this candidate
With 15 years of extensive experience in various domains of the banking environment, I am confident that my skills and expertise align perfectly with the requirements of the role.
Throughout my professional journey, I have had the privilege of contributing to the success of renowned financial institutions, cultivating a profound understanding of the intricacies and demands of the banking industry. My passion for delivering excellence in Identity Access Management has driven me to master various technologies, systems, and protocols, enabling me to create robust security solutions and streamlined access frameworks.
Having managed complex projects throughout my career, I possess a proven track record of implementing and maintaining identity and access governance processes that adhere to regulatory requirements and industry best practices. My ability to identify potential risks and vulnerabilities has allowed me to proactively design and implement preventive measures, mitigating security threats and safeguarding sensitive data. Moreover, my experience in collaborating with cross-functional teams has honed my interpersonal skills, enabling me to communicate effectively with stakeholders at all levels.
Senior Administrator – Identity Access Management
Solving and consulting with users for daily access control operational tasks / questions
Take a leading role in cleaning up and periodic access review projects To contribute to IT quality and process improvement generally
Management of user queries for controls, process and SailPoint issues
Participating in daily user account access control tasks such as business applications/OS user administration, Windows shared directories, etc
Liaising with staff /resource/system owners and support teams etc. on UAC matters
Coordinating and operating of IT Security access control procedures in accordance with the global Application Access reconciliation and associated actions
Investigation and report of any security incidents mainly on access control to management and following-up of detected security exceptions and containment
Making monthly user/system accounts reports to management
Application on-boarding
User certification on applications entitlements