Working in close association with the Senior Manager of IT Governance, Risk Compliance to ensure that authorised users have the right access to company systems, data, and applications. Key Performance Objectives: Identity and Access Management Governance:Develop and implement the IAM programme with policies and procedures.Plan, implement, and manage identity and access management solutions.Work with senior leadership to ensure that the programme meets the needs of the business and complies with all relevant laws and regulations.Monitor compliance with policies, regulations, and business requirements.Train users on policies and procedures.Stay up to date on evolving threats, technologies, and solutions.Collaborate with other departments to ensure secure access to systems and data.Document processes and procedures.Escalate and resolve issues in a timely manner. Risk Management:Perform risk assessmentsCreate and maintain operational risk registers for IAMTrack and monitor remediation activities Compliance:Perform audits.Monitor compliance with internal policies and external regulations.Respond to audit findings and implement remediation measures. Reporting:Create and distribute reports to demonstrate the effectiveness of the IAM programmeRegular reporting to the relevant stakeholders to assess and communicate the effectiveness of the IAM programme and make recommendations for improvementsRegular reporting on the analysis of exceptions, the steps taken to mitigate the exceptions, and recommendations for preventing similar incidents in the future.Monthly tracking and reporting on key IAM programme metrics such as the number of user accounts created, the number of access requests processed, and the number of compliance audits conducted.QualificationsBachelor's degree in Computer ScienceIAM certifications such as CIAM or CIMP will be an added advantageA postgraduate degree will be an advantage Experience 5 – 8 years of experience working in an IAM or related fieldExperience working in a large or multinational organisationStrong technical skills, including experience with identity and access management solutionsFamiliarity with best practices and compliance standardsStrong project management skillsExperience in IT security and/or IT audit Technical CompetenciesIAM certification (CIAM or CIMP) or equivalent working experienceKnowledge of identity and access management concepts, tools and authentication protocolsWillingness to learn new technologies and keep up with industry trends Behavioural CompetenciesEffective communicationRelationship buildingConflict resolutionDecision makingCritical appraisalHolistic thinkingPersuading influenceCoaching