Description

A skilled Business Systems Analyst is sought to support the Identity and Access Management (IAM) Adoption Team within the Enterprise Cybersecurity (ECS) organization. 

This role is responsible for driving successful business adoption of IAM platforms, improving access control, reducing risk, and contributing to the broader cybersecurity objectives. 

The analyst will work cross-functionally with partners across ECS and the enterprise, applying analytical, communication, and agile delivery skills to achieve strategic outcomes.


 

Key Responsibilities

  • Lead and deliver high-quality business and systems analysis within agile teams focused on cybersecurity initiatives.
  • Collaborate with internal stakeholders to identify, document, and translate complex business requirements into epics, stories, and actionable deliverables.
  • Conduct research and data analysis to derive insights, create diagrams, and document current and future state workflows.
  • Apply advanced business analysis techniques to influence platform adoption and align initiatives with enterprise strategy.
  • Facilitate stakeholder engagement sessions and present findings to both technical and non-technical audiences.
  • Guide adoption and integration of IAM solutions across business units.
  • Create and maintain comprehensive product documentation, technical diagrams, and process models.
  • Lead collaboration across teams and product areas to deliver strong business outcomes.
  • Mentor junior analysts and promote continuous improvement across the team.
  • Maintain an in-depth understanding of agile methodologies including Scrum, Kanban, and Lean.


 

Required Qualifications

  • 8+ years of experience as a systems or business analyst working in agile software development environments.
  • Strong understanding of business analysis principles and the ability to manage competing priorities.
  • Demonstrated ability to influence stakeholders and align product strategy with business objectives.
  • Excellent facilitation, documentation, and communication skills.


 

Preferred Qualifications

  • Experience in cybersecurity and identity/access lifecycle management.
  • Hands-on experience with IAM platforms such as SailPoint, AWS IAM, Azure AD, Oracle IAM.
  • Familiarity with tools like CyberArk, HashiCorp, Delinea, BeyondTrust, or Okta.
  • Skills in SQL, Excel, Power BI, data cleaning, and visualization.
  • Bachelor's degree or equivalent experience in Cybersecurity, Information Systems, Business Analytics, or Computer Science.
  • Certifications such as CSPO, CSM, IIBA (CCBA, CBAP, POA), or other cyber/technical credentials

Education

Bachelor's degree