IAM Analyst // Hybrid TX

0 views
Skip to first unread message

Suraj Vitsus

unread,
12:40 PM (7 hours ago) 12:40 PM
to sur...@vitsus.com

Hello

 

My name is Suraj Mishra and I am a Staffing Specialist at Visionary Innovative Technology Solutions LLC. I am reaching out to you on an exciting job opportunity with one of our clients.

 

IAM Discovery Analyst

Location: Austin, TX- Hybrid

Long Term



Role Overview
The IAM Discovery Analyst is a critical role responsible for discovery, analysis, and documentation of enterprise identity ecosystems. The role focuses on identity source discovery, lifecycle mapping, access analysis, and stakeholder-driven documentation to enable robust IAM transformation programs.

This role acts as the foundation for identity governance by establishing visibility across identities, applications, access patterns, and lifecycle processes.

Key Responsibilities

  • Lead identity source discovery across AD, LDAP, Microsoft Entra ID, and cloud IAM environments; onboard and normalize identity datasets
  • Discover and catalogue enterprise applications, authentication flows, and access pathways; map identity-to-application relationships
  • Develop end-to-end Joiner–Mover–Leaver (JML) lifecycle documentation with strong technical writing aligned to audit/compliance needs
  • Lead stakeholder workshops (HR, IT, Security, Business) to capture identity flows, access requirements, and process gaps
  • Perform HRIS–IAM integration mapping including data flows, attributes, triggers, and provisioning workflows
  • Analyze access patterns (roles, entitlements, usage) to establish baseline access models and optimization opportunities
  • Correlate and normalize identity data across systems; eliminate duplicates and identify orphan/shadow accounts
  • Support RBAC/ABAC role modeling and role mining initiatives using access and attribute insights
  • Enable automated discovery using APIs (REST, SCIM) and connectors
  • Identify identity risks (excessive access, toxic combinations, privilege creep) and recommend remediation actions
  • Develop CISO-ready dashboards (coverage %, orphan accounts, privilege exposure, onboarding gaps)
  • Work with IGA tools such as SailPoint IdentityNow, Saviynt, or similar platforms

 

Additional Key Expectation (Critical for Hiring):

  • Strong Business Analyst orientation with ability to translate business processes into IAM constructs
  • Proven experience in Wealth Management domain (client onboarding, advisor access, portfolio systems, regulatory controls)
  • Ability to bridge business, compliance, and technology for identity lifecycle and access governance design

Bottom of Form



Qualifications & Experience

• 6–10 years of experience in IAM, Identity Governance, or Security Engineering 
• Proven experience in large IAM discovery or transformation projects 
• Strong experience in identity lifecycle documentation and technical writing 
• Experience in HRIS integration and enterprise process mapping 
• Experience in leading stakeholder workshops 

Technical Skills

• Identity source discovery (AD, LDAP, Entra ID, Cloud IAM) 
• Application inventory mapping and access discovery 
• Data correlation, normalization, and identity reconciliation 
• RBAC/ABAC understanding and role mining 
• API (REST, SCIM) and connector knowledge 
• Identity lifecycle (JML) mapping 
• Risk and anomaly identification 
• IAM tooling exposure (SailPoint, Saviynt, etc.) 
• Reporting and dashboarding 

Thank You,

 

Suraj Mishra

Technical Recruiter

 

 

 

 

 

A black background with a black square

Description automatically generated with medium confidence

 

image.png            Description: Description: http://upload.wikimedia.org/wikipedia/en/1/1c/E-VerifyLogo.gif            image.jpeg  image.jpegimage.jpegimage.jpeg

 


E: sur...@vitsus.com  

W: vitsus.com

 

 

Visionary Innovative Technology Solutions LLC | 276 Mulberry Street, Plantsville CT 06479

 

 

Confidentiality Notice:

This communication & accompanying documents ("this e-mail") contains confidential and/or privileged information for exclusive use of the individual to whom it is addressed. If you are not the intended recipient, please immediately notify the company & delete this e-mail. Any unauthorized use or disclosure of this e-mail is strictly prohibited. Representations in this e-mail are subject to contract. As an e-mail user please be cautious of the technical & other vulnerabilities of the internet which may result in malicious and/or unauthorized access to / use / alteration of e-mails/e-mail IDs. Thank you

 

 

 

Reply all
Reply to author
Forward
0 new messages