Security Analyst - Access Management
We are seeking a highly motivated and detail-oriented security analyst to support the day-to-day security operations of Sap and Jd Edwards Enterpriseone systems.
The analyst will be responsible for handling Level 1 and Level 2 service tickets, troubleshooting user access and authorization issues, maintaining access roles and security parameters, and assisting with compliance and audit-related tasks.
Key Responsibilities
1. Access Management & Operational Support
* Respond to and resolve Level 1 and Level 2 help desk tickets related to user access, password resets, and authorization issues in Sap and Jd Edwards E1
* Perform user provisioning and de-provisioning in accordance with established access control policies and procedures
* Maintain and update user roles, profiles, and authorizations, ensuring proper segregation of duties (Sod) and least privilege access
2. Security Configuration & Maintenance
* Maintain and monitor security parameters and system settings in Sap and Jd Edwards E1 to ensure compliance with internal policies and external regulations
* Assist in the development and maintenance of role-based access control (Rbac) models and documentation
* Support periodic role clean-up and optimization efforts to reduce excessive or outdated access
3. Monitoring & Incident Response
* Monitor system logs, alerts, and dashboards for suspicious activity or unauthorized access attempts
* Monitor system alerts for process failures and system health checks, ensuring timely identification and resolution of operational issues
* Escalate potential security incidents to senior analysts or the incident response team as appropriate
4. Compliance & Audit Support
* Assist in the execution of internal controls related to user access, including quarterly access reviews, Sod reviews, and audit trail validation
* Prepare and maintain documentation to support internal and external audits, including Sox, Soc, and Gdpr compliance
* Ensure that all access-related activities are properly logged, tracked, and auditable
5. Process Improvement & Documentation
* Contribute to the development and continuous improvement of security operations procedures, knowledge base articles, and training materials
* Identify opportunities to automate or streamline access management and monitoring processes