Sr Lead - Customer Security Operations
Tata Communications
Hyderabad, India
Job Description
Job Summary
The L3 IAM Specialist is responsible for managing and maintaining the organization s identity and access management systems, ensuring secure and efficient access to resources across the enterprise. This role involves providing technical expertise, implementing IAM solutions, and supporting day to day IAM operations. The L3 IAM Specialist collaborates with cross functional teams to implement IAM best practices and ensure compliance with security policies and regulatory requirements.
Responsibilities
Provide tier 3 technical support for IAM related incidents, service requests, and escalations, ensuring timely resolution and adherence to service level agreements SLAs.
Administer IAM systems, including user provisioning, deprovisioning, access requests, and role based access control RBAC, utilizing IAM tools and platforms.
Implement and manage authentication mechanisms, such as single sign on SSO, multi factor authentication MFA, and federation, to enhance security and user experience.
Monitor and audit user access rights, permissions, and entitlements across systems, applications, and data repositories, and ensure compliance with access policies and regulations.
Collaborate with stakeholders to define IAM requirements, design IAM solutions, and implement access control policies and procedures based on industry best practices and standards.
Participate in IAM related projects, including system upgrades, migrations, and integration with other IT systems and applications, ensuring smooth deployment and minimal disruption to business operations.
Conduct periodic access reviews and recertification campaigns to validate user access and identify unauthorized or inappropriate access, and take corrective actions as necessary.
Document IAM processes, procedures, and configurations, and contribute to the development of IAM policies, standards, and guidelines to enhance security posture and governance.
Stay updated on emerging IAM technologies, trends, and threats, and provide recommendations for continuous improvement and optimization of IAM infrastructure and practices.
All product names, logos, and brands are property of their respective owners.