IAM Analyst
The role: As Identity Access Management (IAM) Analyst, you'll be responsible for managing and supporting the organisation's IAM processes and technologies. This role ensures secure and efficient access to systems and applications by implementing IAM standards, principles, and best practices. The IAM Analyst will work closely with IT and security teams to maintain compliance and protect sensitive information, ensuring the right people have the right access to the right systems. What you'll be doing: Administer and support IAM tools such as SailPoint, Adaxes, Active Directory (AD), and Entra AD. Implement and maintain IAM policies, standards, and procedures. Manage and support the capabilities for user provisioning, de-provisioning, and access reviews across systems. Collaborate with Technology and security teams to ensure proper role-based access control, in particular the IT Access Administration Team. Monitor and troubleshoot IAM-related issues and provide timely resolution. Assist in audits and compliance reporting related to identity and access management. Stay updated on emerging IAM technologies and security best practices. Support the IAM Technical lead in reviewing solutions for future improvements and strategy. Essential Criteria A Strong understanding of IAM concepts, standards, and principles, and of how modern identity access works within a corporate environment. Proficiency in IAM tools such as SailPoint , Active Directory (AD) , Entra AD and Adaxes. Knowledge of authentication protocols (e.g., SAML, OAuth, OpenID Connect). Familiarity with regulatory requirements and compliance frameworks related to IAM. Understanding of role-based access control and least privilege principle. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities, engaging with colleagues within the Identity team, IT and Security Teams, as well as Project Managers, Programme Managers and Architects. Ability to consider the experience of the end-user. A commitment to security and compliance. Likely to be degree educated in a relevant subject (e.g. Information Technology, Cybersecurity, or related field (or equivalent experience). Desirable: Professional certifications such as CIAM, CISM, or similar. Experience with cloud-based IAM solutions and integration. Knowledge of privileged access management tools and practices.