Enterprise Access & SAP Security Analyst

Atmos EnergyDallas, TX
2d

About The Position

The ideal candidate will: Design and define user roles and access levels for SAP environments based on business needs and security policies. Develop and document SAP role definitions, including permissions and entitlements. Implement and configure role-based access controls (RBAC) within IAM and SAP systems. Ensure SAP system security by managing user roles and access controls. Conduct regular security assessments and audits of SAP roles and permissions. Administer and manage user roles within IAM and SAP systems, ensuring accurate and efficient role assignments. Provide support and troubleshooting for role-related issues and access requests in SAP environments. Ensure compliance with regulatory requirements and internal policies through regular audits and documentation. Collaborate with SAP functional and technical teams to understand security requirements and implement solutions. Identify and implement opportunities for continuous improvement in role management processes and SAP security practices. THIS JOB DESCRIPTION DOES NOT ATTEMPT TO LIST ALL OF THE DUTIES THAT ARE OR MAY BE PERFORMED IN THIS POSITION

Requirements

  • Bachelor's degree in Computer Science, Information Technology, MIS, Business or related field and one years of related technical experience; or
  • Associate's degree in Computer Science, Information Technology, MIS, Business and two years related technical experience; or
  • A general educational knowledge normally acquired through a high school diploma or a General Equivalency Diploma (GED) and three years related technical experience.
  • Requires the ability to communicate with internal and/or external customers in order to obtain and/or provide explanations and/or modifications on technical or other complex concepts to individuals with little or no background in the area under discussion.
  • Requires the ability to perform analyses involving ratios, percentages and simple statistical methods.
  • Requires advanced knowledge of various software applications for creating documents, reports and/or graphics.

Responsibilities

  • Applies Information Technology security methodologies, policies, procedures and standards as directed to protect information availability and integrity. Documents changes as necessary
  • Process the change control requests for Information Technology ensuring all programs are documented and tested before implementation. Verifies that all approvals are obtained before program and database changes are moved into production.
  • Assists with installing and monitoring security software to control internal and external data access to protect systems. Implements programs for security reporting.
  • Ensures permissions and access to applications and systems is authorized and granted.
  • Runs standard reports for management and system owners regarding security access levels and security violations.
  • Assists with the review of security needs with Information Technology personnel and end users. Implements and maintains procedures and security controls to fulfill those requirements.
  • Acts as primary interface between users and IT engineering and security operations.
  • Stays abreast of hardware, software and methodologies regarding data security.
  • Monitors organizational security tools for alerts and anomalies and works with various departments for resolution. These tools include SIEM, Firewall, APT, and AV technologies.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service