Job Description
BSA CyberArk
Brampton - Hybrid (2-3 days from Office)
Business & Systems Analysis
- Strong experience working as a Business Systems Analyst (BSA) or IAM Analyst in large, complex enterprise environments.
- Proven ability to gather, analyze, and document business, functional, and technical requirements.
- Skilled at translating business needs into actionable IAM and PAM workflows, use cases, and specifications.
________________________________________
CyberArk Functional Expertise
Hands-on functional knowledge of CyberArk Privileged Access Management (PAM), including :o EPM (Endpoint Privilege Manager)
o PAS (Privileged Access Security)
o PSM (Privileged Session Manager)
o PTA (Privileged Threat Analytics)
o Workforce Password Management (formerly Password Vaulting for non-admin users)
Ability to interpret CyberArk design patterns, onboarding methods, and platform configurations without needing to be a core developer.Understanding of credential vaulting, safe structure, onboarding workflows, session monitoring, and policy functions.________________________________________
IAM Concepts & Security Foundations
Strong understanding of IAM principles, including :o Authentication & Authorization
o RBAC (Role-Based Access Control)
o Least Privilege
o Separation of Duties (SoD)
Familiar with identity lifecycle flows, access certification, and entitlement governance.________________________________________
Technical & Domain Knowledge
Understanding of server, database, and application access models across on prem and cloud ecosystems.Exposure to cloud access patterns and privileged identity use cases across platforms.Familiarity with core directory & identity technologies :o Active Directory (AD)
o LDAP
o SSO / Federation
o MFA frameworks
Awareness of common security compliance, risk, and audit requirements (SOX, internal audit, control testing, evidence capture).________________________________________
Documentation & Communication
Experienced in writing :o Functional specifications
o Technical requirement documents
o Process flows
o Use cases
o SOPs and security controls documentation
Ability to communicate effectively with CyberArk engineers, IAM architects, application teams, and security / compliance partners.