- Perform in-depth audits of identity and access management (IAM) controls, ensuring strict adherence to security policies and practices: - Conduct comprehensive reviews of user accounts, permissions, and access rights across all IT systems to prevent unauthorized access. - Implement and oversee a robust process for the creation, modification, and deactivation of user accounts in line with the company's ISMS. - Lead efforts to identify and remediate instances of excessive or inappropriate access rights, ensuring a least privilege approach. - Analyze and resolve any discrepancies in access permissions, and work with IT and business units to rectify issues in a timely manner. - Initiate and manage periodic access reviews, re-certifications, and audits to ensure ongoing compliance with internal and external regulations. - Develop and maintain documentation related to identity and access policies, procedures, and audit findings. - Engage with IT and security teams to enhance IAM tools and processes, contributing to the continuous improvement of the security landscape. - Assist in the integration of IAM solutions with existing and new IT systems, ensuring a seamless and secure user experience. - Collaborate with stakeholders to communicate audit results, recommend corrective actions, and provide guidance on access control best practices. - Support the development and enforcement of policies related to access controls, user entitlements, and identity management lifecycle. -Currently enrolled in a post-secondary education program focused on Information Security, Cybersecurity, Risk Management, Information Systems, or Computer Science. Graduating December 2026 or later. - Detail-oriented with a strong understanding of IT security principles related to IAM. - Eagerness to learn and apply knowledge of auditing standards and frameworks. - Effective English language communication skills, both written and verbal. - Proactive attitude and the ability to manage multiple tasks simultaneously. - Strong analytical skills, with the ability to interpret complex information and present findings in a clear and concise manner. - Familiarity with IAM solutions and access control models. - Understanding of IT security compliance standards and frameworks (e.g., ISO 27001, NIST, SOC2).