.What we look forHighly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads. An effective communicator, you'll be a confident team player with a genuine passion to make things happen in a dynamic organization.If you're ready to take on a wide range of responsibilities and are committed to seeking out new ways to make a difference, this role is for you.Job purposeWe have one global role, Identity and Access Management Business Senior Analyst, available in Madrid (Spain), Malmö (Sweden) or Amsterdam (Netherlands).Reporting to the Process Security Risk Team Lead which is part of the Infosec Department, you will hold a key role in safeguarding an organization's digital assets and ensuring secure access for authorized users.Main ResponsibilitiesDevelop and maintain an IAM framework that allows effective monitoring, management, and mitigation aligned with business objectives associated with the operations of our organization and our technology.Support the development of security standards, procedures, policies, and necessary modifications to existing ones regarding IAM.Review Identity and Access Management processes, covering user lifecycle, regular recertification processes, exceptions, and approvals, in line with Verisure policies.Understand the security needs of internal and external stakeholders, regulators, and auditors and support IAM related controls for an increasing number of regulations.Support, perform, and control the full audit cycle over IAM controls effectiveness and compliance with all applicable directives and regulations.Engage and interact with key stakeholders and provide strategic level advice on the cybersecurity domains to all of them.Required QualificationsMinimum qualificationsBachelor's in Computer Information Systems or related discipline and 3 years of direct experience in information security, with a main emphasis on Information Security & IT risk and compliance.Proven experience working with identity and access management concepts and a pragmatic approach developed through experience working on IAM programs: Strong knowledge of identity management standards and technical skills on access control on different technologies (e.G., Unix, Linux, Windows, Oracle, SQL, RACF, OS400, etc.).Strong understanding of RBAC principles and experience in developing and implementing RBAC policies.Defining, creating, and executing an IAM control framework, not only internally but also for third-party and partners.Experience in documenting security procedures, policies, and standards with a focus on the development of workflows and documentation related to identity and access management.Experience performing assessments and conducting compliance and maturity assessments using international standards and best practices from various industries related to IAM