Luxoft is an emerging global leader in high-end software application development.
Luxoft is a global IT outsourcing and software development company with 7000 employees across 19 locations. It was recently recognized as Leading Central and Eastern European Service Provider in the 2010 Global Services 100 list. Luxoft is famous for flexible delivery models, world's best IT talent pool, low attrition rates, best-of-breed processes and highest security and quality standards.
Luxoft is trusted long-term partner for world class leaders such as Avaya, Boeing, Dell, Deutsche Bank, IBM.
Currently we are looking for
Application Onboarding Analyst
Miejsce pracy: Krakow
Nr Ref.: VR-7997
|
Luxoft - Leading Central and Eastern European IT Service Provider. Learn more about Luxoft at www.luxoft.com
|
Responsibilities:
|
The requirement is for an analyst to work in the Security IT on-boarding team to support the application on-boarding process. This is a 4 phase process consisting of (1) specification - where projects specify the required entitlement / access policy / risk metadata setup, (2) review - where central teams review the specification for completeness, consistency and configurability, (3) approval - where application and data owners approve the configurations, (4) configuration where central operations teams implement the specification. The analysts will be responsible for:
Additional duties will include:
|
Requirements:
|
Nice to have:
|
Apart from what
everyone else offers, we offer: |
Ensuring Access to our client's diverse and large set of systems requires a high level of protection. The Onboarding team is responsible to ensure that all of the applications across the client's business group are onboarded onto the Central Security Identity and Access Management services. With a large number of applications and a very diverse set of stakeholders, the function interacts with may different people, technologies and projects. The function is a very important role within SecurityIT as it ensures that key control processes are adhered to, audit and regulatory requirements are met, Security Risk is minimised and standardisation of access control is implemented and maintained across the organisation. |