Description:
Administer access rights and entitlements to IT / IS systems.
Perform verification of proper authorization and adheres to all security policy and auditing requirements.
Fulfill user access requests within established Service Level Agreements (SLA) with a primary focus on quality and accuracy.
Work in a collaborative team environment to prioritize and distribute workload among team members.
Verify proper authorization on all requests for security access changes, rejects all requests lacking proper authorization; may work with customers to resolve access issues and train users on appropriate requests.
Fulfill requests to IT / IS systems in accordance with the controls and requirements that govern information security access.
Create, modify, and delete user and service accounts.
Modify of security entitlements within multiple security tables and repositories.
Log and track access changes and requests.
Create, modify, and delete security groups and attributes within multiple repositories.
Create, modify, and delete network file shares.
Adhere to all logging and processing requirements established by the Security Governance and Internal Auditing.