Negotiable
Inside
Onsite
Sheffield, England, United Kingdom
Summary: The role of Cyber Cloud IAM BA involves assessing and documenting identity and access management (IAM) processes across multiple cloud platforms, including AWS, Azure, and GCP. The position requires strong communication skills to collaborate with various teams and a data-driven approach to analyze IAM logs and evaluate risks. The candidate must possess in-depth knowledge of IAM constructs and protocols, as well as hands-on experience in mapping IAM processes. This role is based in Sheffield and requires on-site presence three days a week.
Key Responsibilities:
- Elicit and document requirements for IAM processes.
- Map "as-is" and "to-be" access-management processes.
- Conduct gap analysis and produce reports for stakeholders.
- Align Security, DevOps, and business teams through effective communication.
- Analyze IAM logs and evaluate risks.
- Understand IAM constructs in AWS, Azure, GCP, and Alibaba Cloud.
- Identify gaps and recommend least-privilege controls across multi-cloud and SaaS environments.
- Review existing IAM policies and recommend fine-grained least-privilege models.
- Facilitate cross-functional workshops and drive consensus among stakeholders.
Key Skills:
- 5+ years as a Business Analyst focused on IT security, governance, or IAM.
- Hands-on experience with IAM processes in AWS, Azure, and GCP.
- Practical knowledge of AWS IAM, Azure AD & RBAC, and GCP IAM.
- Familiarity with Kubernetes RBAC and its integration with cloud IAM.
- Proven track record in analyzing SaaS-based identity integrations.
- Strong gap-analysis skills for identifying access control weaknesses.
- Comfortable using cloud consoles and reviewing Infrastructure as Code for IAM misconfigurations.
- Excellent stakeholder management and facilitation skills.
Salary (Rate): undetermined
City: Sheffield
Country: United Kingdom
Working Arrangements: on-site
IR35 Status: inside IR35
Seniority Level: undetermined
Industry: IT
Role Title: Cloud IAM Assessment BA
Location: Sheffield
On site requirements: 3 days a week
End Date: 28-Nov-2025
Rate: £400 per day - PAYE Via Umbrella Only
Role Requirements
- Should excel at eliciting and documenting requirements, mapping "as-is" and "to-be" access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders.
- Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analysing IAM logs and evaluating risk.
- On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities.
- Additionally, they should be familiar with SaaS identity management-SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows-to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments.
Aws Iam Cloud-Specific IAM Knowledge (Required):
- In-depth understanding of IAM users/groups/roles/policies, permission boundaries, service-linked roles, and AWS Organisations (SCPs).
- Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., "*" or wildcard actions), and recommending fine-grained least-privilege models
Azure Active Directory & Azure RBAC
- Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies.
- Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation.
Gcp Iam
- Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and Organisation-level policies.
- Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organisation / Folder / Project-level least-privilege structures.
Kubernetes RBAC & Cloud-Native Identities
- Solid grasp of Kubernetes RBAC entities-Role, Cluster Role, Role Binding, Cluster Role Binding-and how they map to Kubernetes API groups.
- Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration).
SaaS Application Identity Management
- Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM).
- Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365).
Required Skills & Experience
- 5+ years as a Business Analyst (or similar) focused on IT security, governance, or IAM.
- Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP.
- Practical knowledge of AWS IAM (users/roles/policies), Azure AD & RBAC, and GCP IAM (roles/bindings).
- Familiarity with Kubernetes RBAC (Role Bindings, Cluster Role Bindings) and how those ties into cloud IAM (EKS, AKS, GKE).
- Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning).
- Strong gap-analysis skills, able to pinpoint missing or weak access controls.
- Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/CloudFormation) for IAM-related misconfigurations.
- Excellent stakeholder management; able to facilitate cross-functional workshops and drive consensus.