Business Analist Identity and Access Management

Posted 3 days 17 hours ago by eTeam

Permanent
Not Specified
Other
Utrecht, Netherlands
Job Description

Description:

Hybrid: 3 days in office Rijswijk or Utrecht

Dutch speaking & minimum 5 years of work experience is required. VOG mandatory!

Update regarding required IAM knowledge and experience:

IAM domain and IAM patterns

IAM architecture with the different components, such as IGA, PAM, AD, Entra ID, source systems, target systems, Cloud, RBAC, PBAC and how they relate to each other and how they are connected

IAM processes (attestation, monitoring, provisioning, etc.)

Business processes with an impact on the IMA domain (inflow, flow, outflow, assignment to case (dynamic access

NO specific IAM certifications are required for the BIA IAM role. However, extensive work experience is necessary. We need someone with knowledge of IAM matters (not technical of a specific application, but at the level of global functionalities and how the IAM landscape is/can be put together) and experience in the business (also here: not specifically NFI) who can move freely and comfortably to get information above water.

The focus for the IAM program is currently on a zero measurement: mapping out where the biggest gaps and risks lie. A program will then be created to achieve the first goals. Think of implementing IGA, PAM and governance structures. The requested BIA is expected to play an important role in this.

IAM

1. Supporting the development of an IAM strategy in which identities are managed securely and standardized both on-premise and in the cloud.

2. Performing information analyses and business analyses in line with the IAM components in the IAM Action Plan:

implementing strong authentication and authorization processes.

ensuring the complete management of identities during their lifecycle (inflow, throughput and outflow of employees and external parties).

automating user management.

realizing dynamic access to NFI systems for internal and external stakeholders in a secure and controlled manner.

realizing facilities for access management by management accounts.

setting up governance with regard to IAM.

being able to comply with the baseline information security government (BIO) and relevant laws and regulations such as AVG, NIS2 and other relevant standards.

IAM requirements/wishes

Your tasks:

The assignment consists of the following components:

• You organize the communication and guidance of business owners, product owners and subject matter experts to arrive at supported requirements statements;

• You are actively involved in translating user requirements into solutions. You have direct contact with subject matter experts, which gives you a good idea of the actual requirement;•

You draw up (business) features, epics and user stories;•

You work together with or in multi-disciplinary NFI scrum team(s) on information and process analyses;•

You support scrum teams in implementing (adapted) processes within the organization;•

You support business and product owners in organizing user acceptance;•

You make proposals and, together with other business information analysts, develop the further design for the role of business information analyst.•

You are a member of the business information analyst team and share your knowledge and experience;•

You advise the CIO office, the Portfolio Board and the Architecture Board in updating and implementing the IV multi-year plan.

W

ork and thinking level (general and specific) Proven number of years

Candidate has demonstrable knowledge and work experience as a business information analyst with the (re)organization of business and/or work processes. 5

Candidate has demonstrable knowledge and work experience as a business information analyst with the retrieval and analysis of information needs. 5

Candidate has demonstrable knowledge and work experience as a business information analyst with the analysis of information system needs. 5

Candidate has demonstrable knowledge and work experience as a business information analyst with the preparation of 'epics' and 'user stories' 2