WHAT DOES AN IDENTITY AND ACCESS MANAGEMENT ANALYST DO?

Updated: Oct 16, 2025 - The Identity and Access Management Analyst is responsible for managing user account lifecycle activities, including setup, access modifications, and terminations in alignment with established security protocols. This role involves supporting clinical information security operations, fulfilling Health IT service requests, and conducting application security testing to ensure compliance with institutional standards. The analyst also analyzes business and end-user needs, identifies risk vectors, and recommends controls under the direction of the Chief Technology Officer.

A Review of Professional Skills and Functions for Identity and Access Management Analyst

1. Identity Access Management Analyst Key Responsibilities

  • IAM Operations: IAM provisioning, monitoring, and the enforcement of PRA security standards and guidelines.
  • Policy Documentation: Responsible for the document’s implementation of security policies around IAM standards and plans.
  • Data Protection: Ensure the protection of corporate data against unauthorized use, access, modification, and destruction.
  • Security Training: Train and document on alerting, archival, and event log management systems.
  • Continuous Monitoring: Responsible for providing continuous monitoring.
  • Access Provisioning: Maintain compliance with IAM policies and procedures through management of access provisioning on PRA devices, servers, and application systems.
  • Infrastructure Security: Maintain a high level of security while protecting PRA’s infrastructure assets.
  • Access Coordination: Coordinate and maintain security access for all applications.
  • Risk Analysis: Analyze business impact and exposure based on access requests, security threats, vulnerabilities, and risks.
  • Security Solutions: Ensure adequate security solutions are in place to mitigate identified risks sufficiently to meet business objectives and regulatory requirements.

2. Identity and Access Management Analyst Details

  • Risk Management: Demonstrate advanced understanding of business processes, internal control risk management, IT controls, and related standards.
  • Control Evaluation: Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement.
  • Process Understanding: Understand complex business and information technology management processes.
  • Service Delivery: Execute advanced services and supervise staff in delivering basic services.
  • IAM Deployment: Responsible for installing, integrating, and deploying Okta, SailPoint, CyberArk, or ForgeRock products in client environments.
  • Technical Communication: Communicate to clients and partners aspects of both the product and the implementation at the technical and functional level appropriate for the situation.
  • Requirements Gathering: Perform post-sales requirements gathering, analysis, and documentation.
  • Project Management: Manage project scope, schedule, status, and documentation.
  • Client Relations: Build and nurture positive working relationships with clients with the intention to exceed client expectations.
  • Profitability Analysis: Identify opportunities to improve engagement profitability.

3. Identity and Access Management Analyst Duties

  • Escalation Management: Act as a point of escalation for any request from all functional teams.
  • Prioritization Assessment: Determine whether a request or incident needs to be escalated based on priority and severity, in alignment with guiding principles.
  • Trend Analysis: Identify incidents/service requests (SRs) for monthly review and analysis, and provide observations for further action.
  • Incident Review: Participate in incident reviews following major incidents, including EPOC.
  • Crisis Coordination: Engage required functions and team members whenever a major escalation or incident occurs.
  • Process Escalation: Escalate all process issues to the Leads and next-level management.
  • Issue Ownership: Maintain day-to-day responsibility for owning and resolving issues (incidents, SRs, tasks) to ensure customer satisfaction.
  • Root Cause Analysis: Complete in-depth root cause analysis to identify, confirm, and address recurring incidents or problems, enhancing IAM processes and preventing recurrence.
  • Reporting Delivery: Ensure reporting needs are met in accordance with requirements from different functions and leadership.
  • Security Compliance: Utilize core security principles when performing IAM support activities.
  • Shift Coverage: Work afternoon shift hours to support global users.

4. Identity and Access Management Analyst Roles

  • Incident Response: Respond to incidents raised due to incorrect access applied and/or failures in technology.
  • Incident Prevention: Follow through on ensuring the avoidance of repeat incidents that result from technology failure.
  • Recertification Coverage: Ensure coverage and effectiveness of access recertification/revalidation activities and program, with no audit findings for the identified scope.
  • Stakeholder Engagement: Build and maintain strong, effective relationships with business customers at all levels and with Technology Services.
  • Request Management: Ensure effective end-to-end request management and a positive customer experience.
  • Access Guidance: Provide regular advice, guidance, and ongoing awareness for access-related activities and processes.
  • Customer Communication: Ensure business customers and peers are aware of key issues and required activities, including people leader responsibilities (i.e., onboarding/offboarding notification and access recertification/validation).
  • Access Analysis: Independently analyze requests to ensure proper separation of duties and that the least privilege principle is applied when granting access across multiple, complex platforms.
  • Reporting and Insights: Produce accurate management information to enable effective decision-making and action.

5. Identity and Access Management Analyst Tasks

  • Issue Resolution: Investigate and resolve access-related queries/issues, ensuring effective resolution in line with defined control activities and procedures, minimizing business disruption.
  • Directory Administration: Administer Active Directory (AD) and other company technologies and sources, ensuring identity data is current and regularly updated.
  • Team Development: Coach, motivate, and develop Access Management Analysts to ensure high-quality service delivery.
  • Quality Assurance: Support and execute QA of the team’s work to ensure an effective, monitored control environment.
  • Team Culture: Foster a culture of continuous improvement, motivation, collaboration, and empowerment within the team.
  • Employee Engagement: Actively engage employees and ensure delivery of team objectives.
  • Cross-Functional Collaboration: Collaborate across the Technology Services department by consulting, gathering, and analyzing required information.
  • Control Execution: Support effective control execution, including onboarding of new applications and other Service Design and Transition initiatives.
  • Service Improvement: Contribute to the development and management of the Service Improvement Plan for Global User Access Management.
  • Continuous Enhancement: Ensure increased flexibility, enhanced customer experience, improved cost effectiveness, and overall continuous improvement.

6. Identity and Access Management Analyst Duties and Roles

  • IAM Implementation: Lead implementation and maintenance of identity and access management, and security-related processes and procedures by providing recommendations around policies, standards, procedures, regulatory compliance, and best practices.
  • Process Improvement: Identify opportunities for improvement and/or update.
  • Demand Management: Manage intake demand through the company request and incident management system and delegate appropriate levels of work to team members.
  • Access Governance: Maintain least privileged access to QBE systems for joiners, movers, leavers (JML), and for authorized users.
  • Access Control: Ensure access granted is in line with job function, controls are maintained, or access is removed in a timely manner.
  • Access Recertification: Lead facilitation and management of access recertification/revalidation processes on a periodic basis (monthly, quarterly, annually, etc.) for in-scope applications and systems based on risk, audit, and business owner direction.
  • Queue Management: Ensure work queue remains within tolerance limits, with focus on meeting or exceeding defined SLAs and other key measures.
  • Request Fulfillment: Process requests and respond to incidents (end-to-end).
  • Performance Monitoring: Perform against defined SLAs and other key measures.

7. Identity and Access Management Analyst Essential Functions

  • Access Administration: Administer user access and controls within the client IT system portfolio.
  • New Hire Onboarding: Onboard new hires using the joiner process and create accounts when authorized by HR and Line Management.
  • Access Updates: Process movers by reaching out to Line Management.
  • Access Modification: Confirm changes to access requirements and perform the requested changes.
  • Leaver Processing: Process leavers in a timely manner by disabling or removing their access when authorized by HR and Line Management.
  • Compliance Remediation: Remediate user access compliance activities as a result of User Access Reviews (UARs).
  • Identity Association: Maintain the association of IT accounts to individual identities.
  • System Lifecycle Management: Onboard new systems into the IAM lifecycle and off-board retired systems.
  • Process Documentation: Follow, maintain, and develop process documentation.

8. Identity and Access Management Analyst Additional Details

  • Security Solution Design: Specify, design, configure, and build security software solutions in an agile software development team.
  • CIAM Implementation: Implement solutions for a customer identity and access platform that supports external and internal human and non-human identities.
  • CIAM Configuration: Responsible for authoring specifications, functional design, and configuring software for a Customer Identity and Access Management (CIAM) solution.
  • Okta Integration: Implement, integrate, and support Okta’s cloud technologies.
  • System Migration: Migrate applications from the current IAM system to the Okta Cloud solution.
  • Business Process Translation: Analyze and author business processes and translate them into technical requirements to implement highly available and secure identity solutions.
  • Governance Collaboration: Partner closely with InfoSec, compliance, and other service owners to establish governance, policies, and requirements.
  • Security Expansion: Work closely with product owners to expand security services to additional products, services, and systems.
  • Solution Scoping: Contribute to solution scoping and effort sizing with cross-functional teams.
  • CIAM Advocacy: Evangelize the adoption of next-generation CIAM capabilities in alignment with evolving business needs.

9. Identity and Access Management Analyst Role Purpose

  • User ID Creation: Create user IDs across all systems utilized by AmeriSave.
  • User ID Management: Manage user IDs across all systems utilized by AmeriSave.
  • User Deprovisioning: Remove user IDs due to termination or other status changes.
  • User Audit: Conduct audits of user IDs across all systems.
  • Remote Onboarding: Onboard new hire remote personnel onto AmeriSave systems.
  • Onboarding Support: Call new hires and walk them through network access on their first day, following a set schedule.
  • AD Administration: Perform Active Directory user administration, including network folder creation and rights assignments.
  • O365 Administration: Responsible for O365 user administration, including Exchange Online, SharePoint, Teams, etc.
  • Azure Administration: Responsible for Azure user and resource administration.
  • In-House App Support: Responsible for user administration on in-house built applications.
  • Cloud Faxing Administration: Responsible for cloud faxing solution user administration.
  • Policy System Management: Responsible for policy and procedure system user administration.
  • Caller ID Management: Responsible for caller ID management through a third-party vendor.
  • Screenshare Administration: Responsible for screenshare user administration through a third-party vendor.

10. Identity and Access Management Analyst Key Accountabilities

  • Requirement Definition: Define and document business and technical requirements for Identity and Access Management systems, including roles, entitlements, access definitions, provisioning lifecycle processes, account lifecycle processes, reconciliation, certification, provisioning, and de-provisioning.
  • Process Analysis: Conduct business process analysis and customer interviews.
  • Compliance Assurance: Ensure compliance and certification of IAM-integrated applications.
  • Gap Analysis: Drive requirement gathering and gap analysis sessions.
  • Application Onboarding: Work with IAM Architects and application business teams to analyze and refine requirements for onboarding into Identity Governance and Administration (IGA).
  • IAM Oversight: Manage Identity and Access Management strategy and operations.
  • Testing Strategy: Develop and implement testing strategies and robust change management processes.
  • Documentation Maintenance: Create, review, and maintain departmental documentation to ensure alignment with current policies and procedures.
  • QA Collaboration: Collaborate with the QA team for all testing cycles.
  • User Guidance: Guide users in building business cases, conducting impact analysis, and supporting testing, implementation, and training activities.
  • Technical Communication: Communicate technical content clearly to assigned project stakeholders.
  • Agile Story Writing: Write product epics and user stories with clearly defined acceptance criteria.

11. Senior Identity and Access Management Analyst Details and Accountabilities

  • Requirements Gathering: Lead and document business and functional requirement definition sessions with business and technical stakeholders.
  • Process Analysis: Conduct business process analysis and requirement gathering for all IAM systems, including Access Management, Identity Lifecycle Management, Identity Governance and Administration, Privilege Access Management, and Data Access Governance.
  • Vendor Coordination: Work with 3rd parties in the development of Playbooks and Runbooks for IAM activities and verify compliance with Procore policies and standards.
  • Roadmap Planning: Collaborate on the planning and execution of the IAM roadmap.
  • Security Alignment: Work closely with the InfoSec team on identifying and documenting all security requirements.
  • Compliance Documentation: Ensure all compliance obligations are documented and considered as part of the IAM solution delivery.
  • Access Provisioning: Responsible for the provision and de-provision of account access requests for Procore employees and contractors.
  • Automation Development: Analyze and resolve authentication, integration, and automation issues by developing models for automated provisioning based on job function.
  • Operational Support: Provide escalation support to services staff on IAM operations.
  • Access Review: Responsible for review and analysis of access requests to ensure compliance.
  • Program Implementation: Assist with the planning and execution of Procore access management program implementation and enhancements.
  • Audit Readiness: Ensure readiness for internal and external audits, including action plans to promptly resolve issues identified.
  • Procedure Management: Ensure standard operating procedures are created and followed.
  • System Integration: Provide input on integrating the identity management, authentication, and authorization framework into existing applications.
  • On-call Support: Provide on-call IAM support and troubleshooting and maintain IAM process and workflow documentation.

12. Identity and Access Management Analyst Functions

  • Requirements Translation: Work with diverse stakeholders to elicit goals and requirements and translate them into high-quality deliverables, including analysis of alternatives, use cases, user journeys, business context diagrams, process flows, and timelines.
  • Project Coordination: Manage parallel initiatives and provide project insights through roadmaps, business cases, schedules, metrics, work breakdown structures (WBS), WBS dictionary, user stories, and risk tracking.
  • Client Advisory: Provide client briefings on technology, market trends, and strategic recommendations.
  • Cross-Functional Collaboration: Work cross-functionally across client business units, program and product management, and Agile teams.
  • Meeting Facilitation: Lead, facilitate, and document client-facing and internal team meetings, preparing agendas and tracking action items for meaningful outcomes.
  • Risk Management: Perform risk management activities, including the development and implementation of mitigation strategies.
  • Executive Reporting: Build executive-level presentations and status reports.
  • Strategic Planning Support: Support long-term planning, vendor engagement working sessions, and facilitate workshops.

13. Identity and Access Management Analyst Roles

  • Stakeholder Analysis: Perform stakeholder analysis for complex programs with large and varied audiences.
  • Requirements Development: Understand business process analysis, requirement gathering, requirement specification, and use case/user story development.
  • Technical Communication: Understand complex technical issues at a high level and communicate them effectively to non-technical stakeholders.
  • Program Leadership: Responsible for leading initiatives, working internally to drive roadmap goals and externally to ensure alignment.
  • Partnership Evaluation: Evaluate and drive strategic partnerships that support and advance program objectives.
  • Independent Execution: Work independently during project initiation-defining goals, setting metrics, and collaborating with stakeholders to deliver program value.
  • Agile Practice: Work with Agile methodologies and tools to support delivery and continuous improvement.
  • Presentation Development: Develop white papers and presentations, and deliver them to internal and external clients.

14. Identity and Access Management Analyst Tasks

  • Access Provisioning: Responsible for the provisioning, access, and security of applications for BMO’s employees.
  • Access Tracking: Direct responsibility for tracking system access for BMO employees.
  • Security Compliance: Ensure logical data security compliance, including granting and decommissioning system access for all supported employees.
  • Application Administration: Responsible for the oversight, support, and daily administration of BMO applications.
  • Process Escalation: Act as the key escalation point for new and/or revised processes, business issues, procedures, and products of a more complex nature, applying in-depth process knowledge.
  • Risk Control: Ensure consistency and effectiveness of risk management and control mechanisms.
  • Business Oversight: Act as a key control over critical business activities related to the area of expertise.
  • Vendor Management: Develop, promote, maintain, and manage an assigned business or group vendor management program to enhance supplier/service provider partnerships and improve productivity, service delivery, and quality.
  • Program Review: Perform periodic reviews, analyze program outcomes, provide insights, and make recommendations for enhancements and changes.

15. Identity and Access Management Analyst Job Description

  • Program Execution: Ensure the effective and efficient execution of all program components, including change management, communications, and risk mitigation for enhancements or changes.
  • Stakeholder Collaboration: Work collaboratively with internal and external stakeholders.
  • Policy Input: Provide input to vendor management policies and procedures.
  • Subject Matter Expertise: Participate in initiatives as a subject matter expert for vendor arrangements or business processes.
  • Issue Resolution: Provide specialized support to investigate and resolve complex issues escalated by end-users or assigned by management.
  • Process Support: Support the management and implementation of documentation, process controls, and knowledge assets required for program operations.
  • User Setup Processing: Process all new user setups, terminations, and supporting documentation for hardware and software procurement.
  • Budget Coordination: Coordinate budgets and reporting to track actual results against the budget.
  • Financial Reconciliation: Prepare financial reconciliations and attestation certificates.

16. Identity and Access Management Analyst Essential Functions

  • Team Training: Educate and cross-train other team members.
  • Vendor Program Support: Support the development and promotion of a business/group vendor management program solution.
  • Solution Development: Develop solutions and make recommendations based on an understanding of the business strategy and stakeholder needs.
  • Technical Support: Provide quality technical support with a high degree of customer satisfaction while meeting service level expectations.
  • Supplier Guidance: Provide advice and guidance to the assigned business/group on the implementation of supplier arrangements.
  • Relationship Management: Participate in the relationship management between BMO internal business/group partners and suppliers/service providers.
  • Process Improvement: Participate in process improvement initiatives and ongoing application audits to ensure compliance with BMO policies.
  • BCP Testing: Participate in Business Continuity Planning (BCP) testing.
  • Program Management: Support the management of the vendor program, including developing and promoting program components.

17. Identity and Access Management Analyst Functions

  • Program Execution: Ensure the execution of all program components and delivery of products/services in accordance with SLA, TSA, or BPA requirements and compliance standards.
  • Supplier Performance Monitoring: Monitor and track supplier performance and address any issues as they arise.
  • Service Delivery: Execute work to provide timely, accurate, and efficient service for both routine and non-routine transactions related to program execution.
  • Stakeholder Relationships: Build effective relationships with internal and external stakeholders.
  • Stakeholder Alignment: Ensure alignment between stakeholders to support program objectives.
  • Strategic Analysis: Break down strategic problems and analyze data and information to provide actionable program insights and recommendations.
  • Reporting and Dashboards: Design and produce regular and ad-hoc reports and dashboards to support decision-making.
  • Business Focus: Focus primarily on the business/group within BMO, with potential for broader enterprise-wide impact.
  • Problem Solving: Exercise sound judgment to identify, diagnose, and solve problems within defined guidelines.
  • Independent Execution: Work independently on a range of complex tasks, including unique or ambiguous situations.

18. Senior Identity and Access Management Analyst Overview

  • Security Impact Analysis: Review or analyze developments/changes to security hardware or software to determine impact.
  • System Auditing: Audit data systems to ensure appropriate precautions over information are highly visible and considered in the design of new and existing systems.
  • Policy Research: Research tactical and strategic plans, policies, and procedures related to data security.
  • Plan Implementation: Implement tactical and strategic plans as approved by Information Security leadership.
  • User Training: Train users to perform their data maintenance responsibilities.
  • Judgment Application: Consistently exercise independent judgment and discretion in matters of significance.
  • IAM Requirements: Assist in defining Identity and Access Management (IAM) requirements, leveraging corporate standards and Effectv needs.
  • Requirements Design: Design and document requirements, configuration, and customization to implement standards.
  • Standards Oversight: Provide oversight, support, and monitoring of IAM standards.
  • Attendance Reliability: Maintain regular, consistent, and punctual attendance.
  • Flexible Scheduling: Work nights and weekends, including variable schedules and overtime.

19. Identity and Access Management Analyst Tasks

  • Story Definition: Define user stories and acceptance criteria.
  • Backlog Management: Produce and prioritize the development backlog for estimation and delivery.
  • Priority Resolution: Manage continuously shifting business priorities and resolve conflicts with existing commitments.
  • Roadmap Contribution: Provide content for product roadmaps and ensure the timely delivery of roadmap items.
  • Change Justification: Provide business rationale for any changes or revisions made to roadmaps.
  • Team Collaboration: Work closely with business and development teams to align on priorities and execution.
  • Enhancement Review: Review enhancement requests for commercial value and clearly convey the product vision to the team.
  • Client Engagement: Engage and interact with clients during feedback sessions, focus groups, user groups, and requirements gathering sessions.
  • Stakeholder Partnership: Partner with LOB GIAM teams and key stakeholders to align objectives and drive value.
  • Needs Assessment: Understand client needs and identify effective solutions to meet those needs.
  • Consensus Building: Build consensus among stakeholders and partner with engineers and designers to deliver high-quality user experiences.
  • Relationship Cultivation: Cultivate trust through strong personal and team relationships with Product Owners, Engineers, and customers.

20. Identity and Access Management Analyst Overview

  • Stakeholder Advisory: Advise stakeholders on options, risks, and aligning priorities.
  • Product Documentation: Provide clear vision and documentation, including use cases, product requirements, and high-level wireframes.
  • Cross-Functional Support: Support UX design, technical development, and operations teams.
  • Security Alignment: Ensure that requirements align with the threat landscape, control objectives, and efficiency goals.
  • Agile Participation: Attend and actively participate in Scrum ceremonies, including sprint planning, standups, demos, and retrospectives.
  • Issue Escalation: Act as an escalation point for client issues requiring product changes.
  • Client Demonstrations: Conduct client demos of new and upcoming functionality.
  • User Documentation: Create help resources for end users and internal support teams.
  • Story Sign-Off: Perform card (user story) sign-off after validating completion.
  • Testing Direction: Provide direction and guidance for testing new functionality.
  • Feature Adoption: Facilitate the implementation and adoption of new functionality through training and live demonstrations.

21. Identity and Access Management Analyst Job Description

  • Application Integration: Responsible for application integration, identity management, and technology initiatives that support security policies.
  • Access Management: Manage Identity and Access within ServiceNow, Customer Portal, Active Directory, AWS, and Google.
  • Client Consulting: Provide consulting services to clients and business partners on an ongoing basis.
  • IAM Ownership: Assume ownership of the IAM system rollout and integration.
  • Implementation Support: Work closely with teams to complete development and implementation tasks.
  • Hands-On Engagement: Dive deep, step in, and be hands-on.
  • IAM Advocacy: Work within large organizations to promote best practices in Identity and Access Management.
  • Problem Solving: Research problems and recommend effective solutions.
  • Security Enhancement: Improve security and processes by providing IAM-focused security options.

22. Identity and Access Management Analyst Details

  • Security Advocacy: Work closely with business partners to champion information security through IAM best practices.
  • Business Enablement: Serve as a business enabler by providing development support and clear planning.
  • Secure Design Documentation: Design documentation for properly secured, policy-compliant, high-performance IAM integrations.
  • Status Reporting: Produce a regular status report.
  • Process Documentation: Create and maintain documentation such as business processes, flow charts, reports, and knowledge-based articles.
  • Change Impact Assessment: Anticipate organizational impact and understand procedures associated with introducing new technologies or processes.
  • Meeting Facilitation: Lead and facilitate conference calls, meetings, and similar events.
  • Process Redesign Support: Assist in business process redesign to optimize efficiency and compliance.
  • Team Communication: Maintain communication with customers and team members while promoting a collaborative team environment.

23. Identity and Access Management Analyst Role Purpose

  • Team Management: Responsible for the day-to-day management of a team of Clinical Information Security Coordinators.
  • Account Administration: Responsible for user account setup, rights modification, and termination, utilizing established security procedures and principles.
  • Employee Training: Assist in training new employees and onboarding team members on new procedures.
  • Helpdesk Support: Provide helpdesk customer support and handle issue escalations.
  • Request Fulfillment: Manage the fulfillment of Health IT service requests, including application security requests and testing to ensure institutional compliance.
  • Needs Analysis: Perform analysis of business and end-user needs to align system functionality.
  • Risk Assessment: Assess application configurations and document potential risk vectors.
  • Control Recommendations: Recommend security controls and document requirements to mitigate identified risks.
  • Security Revision: Revise existing application security configurations under the direction of the UT Health Chief Technology Officer.

24. Identity and Access Management Analyst Key Accountabilities

  • Access Processing: Day-to-day processing of access requests, including but not limited to initial new hire setup, updating accesses and termination of access.
  • Security Review: Perform AATR reviews looking for potential security issues (for example, excessive privileges relative to job role, separation of duties, inappropriate access).
  • RBAC Compliance: Follow frameworks and processes related to RBAC (Role-Based Access Control) and least privilege.
  • Access Monitoring: Review IAM and AD reports for anomalies and inappropriate access.
  • Audit Support: Support internal and external audits by gathering and/or coordinating deliverables for necessary evidence and review.
  • Business Support: Proactively help others and respond to their business needs.
  • Policy Compliance: Ensure that system access is maintained in accordance with company policy.
  • Control Support: Support all access management control activities across all infrastructure systems.
  • Privilege Enforcement: Ensure access to systems is provisioned with the concept of least privilege.
  • Access Evaluation: Evaluate existing access to ensure access levels remain commensurate with job responsibilities.
  • System Improvement: Responsible for evaluating access management systems to show continued improvements in provision processes and operations.

25. Senior Identity and Access Management Analyst Roles

  • Service Line Support: Support service line initiatives within the Identity and Access Management (IAM) team.
  • IGA Analysis: Provide business and technical analysis, and provide operational support for the Identity Governance and Administration (IGA) platform and processes.
  • Daily Operations: Perform day-to-day support activities.
  • Platform Monitoring: Ensure operational excellence of the IGA platform, including monitoring, troubleshooting, and problem resolution.
  • Requirement Gathering: Work with business and technical stakeholders to solicit and gather requirements.
  • Project Participation: Participate in internal and cross-functional projects and initiatives.
  • Testing Leadership: Lead functional and user acceptance testing efforts.
  • Provisioning Standards: Define identity and account provisioning standards, as well as lead operational support for all related on-premises and cloud-based technologies.
  • Infrastructure Design: Design and implement scalable global infrastructure platforms, and have previously supported a fast-moving enterprise environment with a can-do attitude.

26. Identity and Access Management Analyst Essential Functions

  • Roadmap Execution: Work off a prioritized roadmap of functionalities to deploy in any area of the IAM solution.
  • Solution Alignment: Work with an agreed-upon solution design.
  • Functionality Testing: Test the newly deployed functionality in the Dev/Test/Pre-Prod environment.
  • Agile Collaboration: Work with Jira epics and sprints alongside a team.
  • Project Delivery: Complete the roadmap on time and with full visibility and accountability.
  • Program Representation: Interact within the organization as an ambassador of the IAM Program.
  • Process Optimization: Work with the IAM team to establish efficient ways to fulfill repeating access requests, such as system integrations for both on-prem and cloud applications.
  • Cross-Team Partnership: Partner with Information Security and Technology teams for access request fulfillment.
  • O365 Provisioning: Perform user provisioning in O365.
  • Access Management: Manage end-user access (user and application-level accounts) and privileged access (system/admin/elevated-level accounts).

27. Identity and Access Management Analyst Responsibilities and Key Tasks

  • Quality Testing: Manage, facilitate and execute Quality testing on the IAM onboarding process of systems/processes/people into the centralized IAM process.
  • Testing Standards: Develop and maintain testing process materials, standards and guidelines in line with the applicable Bank’s Quality methodology.
  • Relationship Management: Build and manage collaborative working relationships across business groups to deliver a positive customer experience.
  • Gap Communication: Discuss, communicate and prioritize the results of Quality testing gaps.
  • Workaround Facilitation: Impact and facilitate viable workarounds, handoffs and communication of workaround solutions to the training IAM team.
  • Quality Metrics: Establish, maintain and enhance Quality-related KRIs and KPIs on IAM.
  • Influence Leadership: Manage and navigate tough discussions, build collaborative relationships and lead through influence.
  • IAM Expertise: Provide subject matter expertise and oversight of key identity and access management domains utilizing multi-factor authentication (MFA) and single sign-on credentialling process.
  • MFA/SSO Onboarding: Support the onboarding of new MFA and SSO integrations.
  • Framework Integration: Provide input on integrating the IAM framework into new and existing applications.
  • Process Improvement: Responsible for business process analysis and improvement, access certification, as well as system architecture, design, and hands-on implementation.
  • Requirements Gathering: Collect and define requirements from stakeholders to understand and formulate business requirement requests.
  • Process Documentation: Maintain accurate documentation of processes, etc.

28. Identity and Access Management Analyst General Responsibilities

  • System Monitoring: Monitor systems associated with IAM solutions and provide incident and problem management support.
  • Stakeholder Collaboration: Proactively work with technology and product managers.
  • Issue Remediation: Identify potential issues and ensure effective remediation.
  • Lifecycle Support: Support issues pertaining to identity lifecycle management processes (new hire onboarding, employee separation, job transfers, access remediation and privileged access requests) in compliance with established policies, procedures, and SLAs.
  • Audit Support: Assist in the collection and verification of SOX documentation and audit samples.
  • Global Support: Provide support to the global enterprise, including 24-hour availability, required solution response throughout implementation efforts and Go-live activities.
  • IAM Delivery: Responsible for the delivery, support and integration of Identity and Access Management systems, such as but not limited to Single Sign-on (SSO), Multi-Factor Authentication (MFA) and Privilege Access Management (PAM).
  • Requirement Gathering: Work with stakeholders to gather requirements needed for system and application integration with all Identity and Access Management (IAM) platforms.
  • Process Improvement: Deliver process improvements utilizing Identity and Access Management platforms.
  • IAM Automation: Provide scripting experience/knowledge to automate IAM-related activities.
  • Service Escalation: Serve as an escalation of IAM services and related incidents.

Editorial Process and Content Quality

This content is part of Lamwork's career intelligence platform and is developed using structured analysis of real-world job data, including publicly available job descriptions, skill requirements, and hiring patterns.

Lam Nguyen, Founder & Editorial Lead, defines the research framework behind Lamwork's career intelligence platform, including job role analysis, skills taxonomy, and structured career insights.

All content is reviewed by Thanh Huyen, Managing Editor, who oversees editorial quality, content consistency, and alignment with real-world role expectations and Lamwork's editorial standards.

Content is developed through a structured process that includes data analysis, role and skill mapping, standardized content formatting, editorial review, and periodic updates.

Content is reviewed and updated periodically to reflect changes in skills, role requirements, and labor market trends.

Learn more about our editorial standards.