The ideal candidate will:
- Design and define user roles and access levels for SAP environments based on business needs and security policies.
- Develop and document SAP role definitions, including permissions and entitlements.
- Implement and configure role-based access controls (RBAC) within IAM and SAP systems.
- Ensure SAP system security by managing user roles and access controls.
- Conduct regular security assessments and audits of SAP roles and permissions.
- Administer and manage user roles within IAM and SAP systems, ensuring accurate and efficient role assignments.
- Provide support and troubleshooting for role-related issues and access requests in SAP environments.
- Ensure compliance with regulatory requirements and internal policies through regular audits and documentation.
- Collaborate with SAP functional and technical teams to understand security requirements and implement solutions.
- Identify and implement opportunities for continuous improvement in role management processes and SAP security practices.
THIS JOB DESCRIPTION DOES NOT ATTEMPT TO LIST ALL OF THE DUTIES THAT ARE OR MAY BE PERFORMED IN THIS POSITION
Primary Duties
1. Provides troubleshooting assistance to users regarding complex security and access issues.
2. Partners with users and internal/external staff to monitor reports and departmental level security access within applications or systems.
3. Reviews reports, statistics, and interacts with customers and recommends changes to management.
4. Provides one-on-one training and day to day guidance to users and less experienced IT analysts and peers.
5. Maps and reviews workflows in provisioning users into our systems and infrastructure. Recommends and makes application configuration changes as needed.
6. Identifies and recommends provisioning and Identity Access Management process changes that improve productivity and customer service.
7. Reviews and approves access requests. Provides Role Based Access Control (RBAC) to individual users and performs recertification based on segregation of duties and roles.
8. Complies with internal and external audit requests. Provides data for audit indicating changes made to access control lists to facilitate audits and other investigations.
9. Provides support, guidance, and mentorship for IT Security Analysts. Reviews Analyst productivity and recommends changes as needed.
10. Provides technical advisement internally across the Enterprise.
11. Monitors the effectiveness of the Enterprise-wide information security program.
12. Applies Information Technology security methodologies, policies, procedures and standards as directed to protect information availability and integrity. Documents changes and provides team leadership as necessary.
13. Stays abreast of hardware, software and methodologies regarding data security and access control.
14. Along with leadership recommends and implements new IT access tools and process improvements.
MINIMUM REQUIREMENTS & SKILLS
Educational/Experience Level
1. Bachelor's degree in Computer Science, Information Technology, MIS, Business or related field and three years of related technical experience; or
2. Associate's degree in Computer Science, Information Technology, MIS, Business and five years related technical experience; or equivalent.
3. Prior leadership experience welcome.
4. Experience with Identity Governance & Lifecycle tools such as RSA, Okta, and Ping a plus. Experience with AD end user computer is also a plus.