Mô tả công việc
Mô tả Công việc
SUMMARY:
The Identity and Access Management Coordinator is responsible for managing user access rights and identities within the company by creating, modifying, and deactivating accounts. The coordinator ensures appropriate access levels are granted based on roles and responsibilities while adhering to security policies and compliance regulations working closely with various departments to maintain data integrity and user access control across systems
RESPONSIBILITIES AND DUTIES:
User Account Management:
Managing access levels and assigning roles to users based on their job functions.
Performing access certification process to ensure users only have the necessary access.
Hire- verify from Dayforce title, site, role in Active Directory for initial software needs and SharePoint access.
Promotion/Modifications- process access tickets for adding, modifying, removing access to all systems internally (SharePoint, mapped drives, e- Spider, RFQ&039;s) and externally (Covisint, Teamcenter, etc.)
Provisioning and de- provisioning user accounts based on employee lifecycle events (hire, promotion, termination).
Name/ID changes- manages name/ID changes and all associated application changes to match the new name/ID.
Termination- disable all access, suspend (delete in 30 days) Active Directory permissions. Work with Outlook administrators to share mailbox, set out of office notice, mail forwarding, etc. Update any internal SPI application workflows.
Reviewing and updating user access rights regularly to maintain compliance
System Administration:
Reclaims all software licenses from separated users to be applied to new application requests.
Troubleshooting access issues and resolving user access requests.
Order, track, and create purchase orders for any new software purchases managed through IT.
Software license tracking for all IT managed applications (Microsoft User O365, Windows OS, Server OS, SQL, Visio, Project).
Compliance and Auditing:
Generating reports on user activity for compliance purposes.
Ensuring adherence to data privacy regulations and industry standards.
Conducting regular access audits to identify potential security risks.
Collaboration and Communication:
Provisioning and de- provisioning user accounts based on employee lifecycle events (hire, promotion, termination).
Communicating Identity and Access Management policies and procedures to end users and stakeholders.
Working with HR to manage employee data and access changes.
Generating reports on user activity for compliance purposes.
Promotion/Modifications- process access tickets for adding, modifying, removing access to all systems internally (SharePoint, mapped drives, e- Spider, RFQ&039;s) and externally (Covisint, Teamcenter, etc.)
Communicating Identity and Access Management policies and procedures to end users and stakeholders.
Troubleshooting access issues and resolving user access requests.
Performing access certification process to ensure users only have the necessary access.
Conducting regular access audits to identify potential security risks.
Reclaims all software licenses from separated users to be applied to new application requests.
Hire- verify from Dayforce title, site, role in Active Directory for initial software needs and SharePoint access.
Name/ID changes- manages name/ID changes and all associated application changes to match the new name/ID.
Working with HR to manage employee data and access changes.
Termination- disable all access, suspend (delete in 30 days) Active Directory permissions. Work with Outlook administrators to share mailbox, set out of office notice, mail forwarding, etc. Update any internal SPI application workflows.
Reviewing and updating user access rights regularly to maintain compliance
Collaborating with application owners to define access requirements for new applications.
Software license tracking for all IT managed applications (Microsoft User O365, Windows OS, Server OS, SQL, Visio, Project).
Order, track, and create purchase orders for any new software purchases managed through IT.
Ensuring adherence to data privacy regulations and industry standards.
Managing access levels and assigning roles to users based on their job functions.
Collaborating with application owners to define access requirements for new applications.