Job Description
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:106%"><span style="font-family:"BLK Fort""><b><span lang="EN-US" style="font-size:10.0pt"><span style="line-height:106%">About the Role:</span></span></b></span></span></span></p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">The Systems Access and Entitlements Officer will lead all aspects of the management of enterprise entitlements and system access privileges for the <b><i>Jio Blackrock AMC</i></b>.</span></span></span></span></span></p>
<p style="border:none; text-align:justify"> </p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">Reporting into the head of Head Technology & CISO for the <b><i>Jio Blackrock AMC</i></b>, he/she will ensure the efficient delivery of the Identity and Access Management program.</span></span></span></span></span></p>
<p style="border:none; text-align:justify"> </p>
<p style="border:none; margin-right:8px; text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:116%"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="line-height:116%"><span style="color:black">This role is crucial in ensuring that access to critical enterprise systems is controlled in consistency to the IAM framework, to accord world class security for the enterprise.</span></span></span></span></span></span></p>
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="tab-stops:64.5pt"><span style="line-height:106%"><span style="font-family:"BLK Fort""><b> </b></span></span></span></span></p>
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:106%"><span style="font-family:"BLK Fort""><b><span lang="EN-US" style="font-size:10.0pt"><span style="line-height:106%">Key Responsibilities</span></span></b></span></span></span></p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">In partnership with the Information Security group, he/she has a pivotal role in developing and driving an IAM program spanning the realms of identity & access governance, entitlements recertifications and associated identity & access lifecycle management procedures.</span></span></span></span></span></p>
<p style="border:none; text-align:justify"> </p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">He/she is predominantly responsible for building the structure of entitlements and privileges for employees of the <b><i>Jio Blackrock AMC</i></b>, ensuring that </span></span><span lang="EN-US" style="font-size:10.0pt">system<span style="color:black"> access privileges are optimized. </span></span></span></span></span></p>
<p style="border:none; text-align:justify"> </p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">The individual also plays a key role in recertifying enterprise access privileges granted to employees on a periodic frequency, ensuring that the mantra of “principle of least privilege” is always adhered to.</span></span></span></span></span></p>
<p style="border:none; text-align:justify"> </p>
<p style="border:none; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt"><span style="color:black">Other responsibilities of the individual include:</span></span></span></span></span></p>
<ul>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Metrics and Reporting: Reporting will also constitute a key element of this role. The successful candidate will provide IAM related metrics to the management on the standings of the IAM program. </span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">IAM Employee Awareness Training: He/she will also take charge of the development and training of employees on the domain of access, to alleviate risks stemming from lack of appreciation of system entitlements.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Information Security Coordination: He/she may also aid Information Security in facilitating broader information security themed projects and assignments relating to systems and data access.</span></span></span></span></li>
</ul>
<p style="margin-bottom:11px"><span style="font-size:11pt"><span style="background:white"><span style="line-height:106%"><span style="font-family:"BLK Fort""><b><span lang="EN-US" style="font-size:10.5pt"><span style="line-height:106%"><span style="color:#4a4a4a">Knowledge / Experience:</span></span></span></b></span></span></span></span></p>
<ul>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">6-8 years of relevant experience</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Exceptional interpersonal skills with ability to communicate with senior leaders and technology teams alike. </span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Ability to work independently and adapt to changing business priorities.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Detail oriented individual, with a keen eye towards details.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Meticulous IAM skills</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Superior knowledge in the fields of Identity Governance and Identity Lifecycle management</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Background in End User Accounts Management, Identity Access Management, and Privileged Access Management is mandatory. Background in Information Security is preferred.</span></span></span></span></li>
<li style="margin-bottom:8px; text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Must possess basic working knowledge of core technology and networking technology stacks, which may include but is not limited to;</span></span></span></span>
<ul style="list-style-type:circle">
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Legacy and Modern IdPs such as Active Directory, LDAP, Entra ID, OKTA</span></span></span></span></li>
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Cloud Computing</span></span></span></span></li>
<li style="text-align:justify"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Remote Access Systems</span></span></span></span></li>
<li style="text-align:justify; margin-bottom:11px"><span style="font-size:11pt"><span style="line-height:normal"><span style="font-family:"BLK Fort""><span lang="EN-US" style="font-size:10.0pt">Database Servers</span></span></span></span></li>
</ul>
</li>
</ul>