UST
Website:
ust.com
Job details:
Role Description
Role Description:
The
Privileged Access Management BA role is based within the Cyber Security Identity Access Management (IAM) PAM and Secrets Team. The Team supports the Head of PAM and Secrets ensuring unauthorized access to privileged accounts is prevented, credentials are securely stored, managed, timebound and monitored in use.
High Level Skill Set
The Privileged Access Management BA role is based within the Cyber Security Identity Access Management (IAM) PAM and Secrets Team. The Team supports the Head of PAM and Secrets ensuring unauthorized access to privileged accounts is prevented, credentials are securely stored, managed, timebound and monitored in use.
- Strong IAM/PAM expertise: Solid hands-on experience with privileged access controls, secrets management, and tools like CyberArk or Beyond Trust.
- Compliance know-how: Familiar with regulatory standards (GDPR, SOX, PCI DSS, ISO 27001) and comfortable operating in regulated environments.
- Risk and governance: Skilled at identifying risks, managing issues, and implementing governance frameworks.
- Stakeholder engagement: Confident communicator, able to work with business, IT, and security teams across all lines of defense.
- Team leadership: Experience leading cross-functional and remote teams, driving collaboration, and resolving blockers.
- Data-driven: Strong analytics skills—building dashboards, reporting on KPIs/KCIs/KRIs, and turning data into actionable insights.
- Process improvement: Always looking for ways to streamline, automate, and enhance security processes.
- Documentation: Capable of producing clear project docs—plans, reports, and status updates.
- Certifications: CISSP, CISM, or similar are a bonus.
Key Responsibilities
- Be responsible for maintaining, and uplifting IAM PAM control.
- Identify, investigate, and report potential Cybersecurity related exposures and recommend corrective action, maintaining SME support and/or ownership through to resolution.
- Work alongside the IDAM Control Owners to record, monitor, and publish MI / KCI reporting; dashboards; for the Cybersecurity management and other appropriate stakeholders.
Stakeholder Engagement
- Collaborate with business units and IT teams, to gather requirements and ensure smooth project execution.
- Provide regular updates to senior management and other stakeholders.
Governance And Compliance
- Experience of working in a regulated environment with exposure to global regulatory requirements, including GDPR, SOX, PCI DSS, and ISO 27001.
- Implement robust governance practices to manage risks and ensure compliance.
Team Coordination And Leadership
- Lead cross-functional teams, work alongside project managers, control owners, business analysts, and technical specialists. Foster collaboration and resolve conflicts to maintain project momentum.
- Proven track record of working with technical, cybersecurity and/or operations teams.
- Lead geographically disbursed team and pull them together to achieve common objectives.
- Excellent written and verbal communications
Process Improvement
- Continuously evaluate processes and propose enhancements to improve efficiency, scalability, and security.
- Develop and implement best practices for project delivery.
Risk and Issue Management
- Identify, assess, and mitigate risks throughout the project lifecycle.
- Proactively manage issues and dependencies to avoid project delays.
Documentation
- Project initiation, planning, execution, monitoring, and closure documentation including but not limit project charter, project plan, various status report, performance report and project closeout report.
Experience
- Knowledge & Experience of Identity & Access Management (IAM) Controls
- Technical background within security spaces- Privileged Access Management
- Extensive knowledge on managing compliance IAM Security Standards
- Able to understand Operating Effectiveness of IAM Secrets Controls, Identify Gaps and Remediate
- Manage & Govern KPIs / KCIs / KRIs
- Stakeholder Management – Across all Lines of Defence
- Communication Skills for stakeholder collaboration on Standard Procedures and Best Practices
- Role relevant qualifications, i.e.CISSP/CISM is desirable but not essential
- Strong presentation and reporting skills.
Skills
business analysis,privileged access management,identity and access management,cyberark,
Click on Apply to know more.