Business Analyst - Logical Access Management Mainframe domain

Posted 1 day 17 hours ago by Base 3

Contract
Not Specified
Other
Brussel, Brussel (Stad), Belgium
Job Description

Note

  • Candidates should be based in Belgium, France, The Netherland or the UK
  • The client will accept UK based candidates if they use an accredited umbrella company for this assignment
  • 8 days a month at a clients office is mandatory of which 4 days in the Brussels office

We are seeking an experienced Business Analyst to oversee the creation, management, and optimization of business roles within our Identity Governance and Administration (IGA) platform. The successful candidate will play a critical role in ensuring business roles accurately reflect organisational needs, support compliance requirements, and facilitate efficient user access management

Preferred skills and qualifications:

  • Understanding of the current IAM regulations and standards.
  • Understanding of Mainframe and RACF.
  • Experience of LAM for Mainframe applications and security sub-system data models.
  • Certifications in Business Analysis like CBAP, ECBA or CCBA.
  • Business process modelling, and experience with process mapping tools like Adonis or Visio.

Objectives:

  • Support the Project Lead in Scope definition by understanding the overall objective and constraints in the field of Identity and Access Management.
  • Collect requirements and transform them into a structured and comprehensive work product.
  • Develop and own the benefits profile through to metrics and ensure business ownership.
  • Provide guidance on Mainframe LAM processes, data and roles.
  • Define clear acceptance criteria which can serve as a comprehensive test set.
  • Analysis of Target Operating Model and implementation/migration approach, to refine and validate scope and requirements, to identify changes.

Responsibilities:

  • Implement, and maintain business roles to align with organisational structures and access requirements.
  • Collaborate with business units, IT teams, and compliance stakeholders to gather requirements and translate them into effective role definitions.
  • Analyse access patterns and propose role modifications or new roles to improve operational efficiency and reduce risk.
  • Document role definitions, assignment criteria, and related processes in a clear and accessible manner.