Work with technical leads to understand business requirements, enterprise IT standards and other considerations that influence how cyber tooling should work in the organization.
Work with the broader IT security, risk and compliance organization to interpret policies and standards, ensuring policies and standards are properly followed by the cyber security solutions.
Understanding of security risk and implementation of mitigating controls
Liaising with internal stakeholders to understand business processes
Mapping business requirements to technical requirements
Designing secure patterns for Identity Flows
Supporting the team with process, run books, on-boarding documentation
Working with the international teams to capture requirements from the various stakeholders.
Gathering findings from internal and external audit to help shape requirements for the next phase of the project.
Working closely with the PM to deliver per schedule.