What success looks like in this role :
Roles and Responsibilities
Data Mining and Analysis
- Analyze cloud security insights from WIZ to identify IAM vulnerabilities and compliance gaps.
- Retrieve and analyze user access data from SailPoint and CyberArk to support identity governance and role-based access analysis.
- Query Active Directory to gather information about user roles permissions and group memberships.
- Extract and correlate relevant data from SIEM tools to monitor IAM compliance and policy adherence.
- Leverage ServiceNow CMDB to establish relationships between assets dependencies and relevant IAM data for comprehensive system correlation.
Data Cleaning and Transformation
Clean and validate extracted datasets to ensure accuracy remove duplicates and resolve inconsistencies.Transform raw IAM and security data into meaningful formats suitable for visualization and analysis in Power BI .Integration and Automation
Automate data extraction processes from multiple sources such as SIEM WIZ Active Directory and SailPoint using scripting (Python PowerShell) or REST APIs .Ensure seamless integration of various data sources into Power BI for near real-time reporting and insights.Power BI Report Creation
Design and develop interactive Power BI dashboards and visualizations showcasing key IAM metrics KPIs and compliance trends.Build reports to highlight access control gaps role governance metrics and IAM operational efficiency.Continuously enhance dashboards based on stakeholder feedback and evolving IAM program requirements.IAM Engineering and Support
Collaborate with IAM engineering teams to support design and integration of new IAM initiatives such as Passwordless Authentication programs .Provide technical recommendations to improve automation reporting and analytics across IAM processes.Desired Candidate Profile :
Strong understanding of Identity and Access Management (IAM) concepts including authentication authorization role-based access control (RBAC) and identity governance.Hands-on experience with IAM tools such as SailPoint CyberArk and Active Directory .Experience in data analysis data transformation and reporting using Power BI .Proficiency in scripting or automation (Python PowerShell or SQL) for data extraction and integration.Familiarity with cloud security platforms (WIZ) SIEM tools and ServiceNow CMDB .Strong analytical problem-solving and data visualization skills.Excellent verbal and written communication with the ability to convey technical insights to business stakeholders.You will be successful in this role if you have :
Qualifications :
Bachelors degree in Computer Science Information Security Data Analytics or equivalent field.68 years of total experience in cybersecurity or IAM with at least 45 years in IAM data analytics reporting or automation.Preferred certifications : Microsoft Power BI Okta Certified Professional SailPoint Certified IdentityNow Engineer Security or equivalent.Experience with cloud and IAM integration projects and exposure to Passwordless Authentication initiatives will be an added advantage.Unisys is proud to be an equal opportunity employer that considers all qualified applicants without regard to age blood type caste citizenship color disability family medical history family status ethnicity gender gender expression gender identity genetic information marital status national origin parental status pregnancy race religion sex sexual orientation transgender status veteran status or any other category protected by law.
This commitment includes our efforts to provide for all those who seek to express interest in employment the opportunity to participate without barriers. If you are a US job seeker unable to review the job opportunities herein or cannot otherwise complete your expression of interest without additional assistance and would like to discuss a request for reasonable accommodation please contact our Global Recruiting organization at or alternatively Toll Free : (Prompt 4). US job seekers can find more information about Unisys EEO commitment here.
Required Experience :
Senior IC
Key Skills
Security Management,Sensitive Information Management,Pressure Management,Risk Analysis,Access Control,Safety Procedures,Security Measures,Security Training,Risk Assessment,Access Point,Security Checks,Detect Signs,Safe Environment,Security System,Security Reports
Employment Type : Full Time
Experience : years
Vacancy : 1