Software Developer/ Engineer/ Architect

Information Security Operations Analyst II

Job Title

Information Security Operations Analyst II

Overview

• Identity Access Management teams are responsible for end to end providing services to support internal employees and external customers capabilities to retrieve physical and logical access to Mastercard systems and applications.

• The Employee Identity Access Governance team within Corporate Security is laser focused on automating access using behaviour analytics tools, executing on access strategy to be an enabler to the business, while creating and fostering a robust security controls environment

• The purpose of this job is to identify ways to leverage the access data to answer important business questions.

• This would include automating access using behaviour analytics & governance tools, understanding of end to end provisioning of access across enterprise platforms, and innovating techniques to use and communicate data in new and more effective ways to influencing how access should be granted to users.

• Are you a self-starter with good communication skills that can interact with individuals at all levels of the company?

• What interests you about Information Security and big data?

• Give an example of when you have thought outside of the box to solve a problem?

Role

• Requests and consulting services needed to internal business and application teams, including training.

• Supports internal efforts for requirements to production implementation of enhancements of existing Identity Access Governance system.

• Identifies automation opportunities to deliver smarter and easier identity access management services to support “access as an enabler” strategy.

• Complies with documented processes and provide feedback for improvements

• Challenges the status quo processes and identifies way to automate through implementation.

• Supports all annual certification & governance reviews (such as transfers).

• Supports senior team members in voice of the customer efforts to understand the business needs from regional business leaders for continuous improvement.

• Partners with other peers in the Employee Identity Access Management organization to ensure governance processes are in place, enabling access to the business with least privileges

• Research new methodologies to improve security within the identity access management space

• Basic to intermediate skills in Information Security

• Intermediate strategic thoughtful risk taking experience

• Intermediate analytical skills working with large amounts of data and identifying outliers

• Beginner to intermediate knowledge in regulatory compliance (PCI, GLBA, SOX).

• Intermediate technical background (Windows, UNIX, databases) and basic network fundamentals.

• Strong organization, problem solving, and communication skills.

• Basic to intermediate knowledge of user behavior analytics systems is a plus