Job DescriptionBSA CyberArk
Brampton - Hybrid (2-3 days from Office)
Business & Systems Analysis
• Strong experience working as a Business Systems Analyst (BSA) or IAM Analyst in large, complex enterprise environments.
• Proven ability to gather, analyze, and document business, functional, and technical requirements.
• Skilled at translating business needs into actionable IAM and PAM workflows, use cases, and specifications.
________________________________________
CyberArk Functional Expertise
• Hands-on functional knowledge of CyberArk Privileged Access Management (PAM), including:
o EPM (Endpoint Privilege Manager)
o PAS (Privileged Access Security)
o PSM (Privileged Session Manager)
o PTA (Privileged Threat Analytics)
o Workforce Password Management (formerly Password Vaulting for non-admin users)
• Ability to interpret CyberArk design patterns, onboarding methods, and platform configurations without needing to be a core developer.
• Understanding of credential vaulting, safe structure, onboarding workflows, session monitoring, and policy functions.
________________________________________
IAM Concepts & Security Foundations
• Strong understanding of IAM principles, including:
o Authentication & Authorization
o RBAC (Role-Based Access Control)
o Least Privilege
o Separation of Duties (SoD)
• Familiar with identity lifecycle flows, access certification, and entitlement governance.
________________________________________
Technical & Domain Knowledge
• Understanding of server, database, and application access models across on prem and cloud ecosystems.
• Exposure to cloud access patterns and privileged identity use cases across platforms.
• Familiarity with core directory & identity technologies:
o Active Directory (AD)
o LDAP
o SSO / Federation
o MFA frameworks
• Awareness of common security compliance, risk, and audit requirements (SOX, internal audit, control testing, evidence capture).
________________________________________
Documentation & Communication
• Experienced in writing:
o Functional specifications
o Technical requirement documents
o Process flows
o Use cases
o SOPs and security controls documentation
• Ability to communicate effectively with CyberArk engineers, IAM architects, application teams, and security/compliance partners.