Jul 2019
Present
Analyst
NET CONNECT ( Working In IBM Project)
Bangalore Urban, IN
IBM:( Identity & Access Management-Analyst, July 2019 to present)
• I have performed secondary controls activities such as Employment verification (EV) , Continued Business need (CBN) and Privileged re validation (PR) for the account across various platforms, also holds the responsibility for monitoring the accounts progress as an Governance focal.
• It is my responsibility to handle the Escalations and Noncompliance issues part of the process and have taken part in many Audits for this project
• Create, amend, suspend or decommission user accounts.
• Collecting records of IDs and privileged access used as input to the Secondary Controls
• Performing reconciliation with on-server records as necessary
• Performing the required privilege authorization review checks on the security inventory at the required frequency
• Distributing records of IDs and privileged access to validators
• Reviewing validation results
• Performing employment verification and reviewing verification results
• Escalating non-responses (where required
• Reviewing the output of each privilege authorization review checked
• Identifying deviations and false positive deviations
• Notifying appropriate parties of deviations for Privilege Authorization Review, where appropriate
• I have performed secondary controls activities such as Employment verification (EV) , Continued Business need (CBN) and Privileged re validation (PR) for the account across various platforms, also holds the responsibility for monitoring the accounts progress as an Governance focal.
• It is my responsibility to handle the Escalations and Noncompliance issues part of the process and have taken part in many Audits for this project
• Create, amend, suspend or decommission user accounts.
• Collecting records of IDs and privileged access used as input to the Secondary Controls
• Performing reconciliation with on-server records as necessary
• Performing the required privilege authorization review checks on the security inventory at the required frequency
• Distributing records of IDs and privileged access to validators
• Reviewing validation results
• Performing employment verification and reviewing verification results
• Escalating non-responses (where required
• Reviewing the output of each privilege authorization review checked
• Identifying deviations and false positive deviations
• Notifying appropriate parties of deviations for Privilege Authorization Review, where appropriate