| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Section | Security_Focus | Time Allocation | Responsibility_Function | Detailed_Description | Typical_Activities_Examples | Tools_Systems_Involved | Stakeholders_Served | Leadership_Ownership_Angle | Resume_Ready_Positioning | ||||||||||||||||
2 | Core Role - Security/IAM Operations | High | 25% | Lead termination and deprovisioning execution across AD and business applications | Own the operational side of identity offboarding by removing or disabling access in on-prem AD and downstream applications, validating completion, and helping ensure terminated users do not retain orphaned access. | Process termination tickets; remove shared drive, mailbox, SSO/SAML, app, and group access; confirm completion with peers/app contacts; support follow-up calls on recent production terminations; provide ad hoc termination reporting. | Active Directory, ServiceNow, SaaS/admin portals, Outlook, Teams | Managers, Security, UAM peers, application teams, auditors | Acts as a reliable control point for timely access revocation and helps drive completion across multiple teams and systems. | Identity lifecycle / deprovisioning control execution with security risk reduction and audit traceability. | ||||||||||||||||
3 | Core Role - Access Administration | High | 25% | Administer AD entitlements and core access changes for shared drives, mailboxes, and group-based access | Perform day-to-day access administration in the on-prem AD environment, translating approved requests into accurate entitlement changes while maintaining least-privilege alignment and business continuity. | Add/remove shared drive permissions; mailbox access changes; update AD security groups; maintain SSO/SAML-linked groups; adjust access for role changes and exceptions. | Active Directory, Exchange/mailbox administration, SSO/SAML group mappings, ServiceNow | End users, managers, app owners, service desk, Security | Owns high-volume entitlement changes with strong accuracy expectations and serves as a go-to operator for access-sensitive work. | Access administration and entitlement management across AD and federated application environments. | ||||||||||||||||
4 | Core Role - Provisioning & Onboarding | High | 20% | Provision new hire and app access requests with approval-aware control discipline | Create and update user access for new hires and role changes, ensuring provisioning follows documented workflows, approvals, and application-specific requirements rather than informal copying of access. | Work new hire tickets; provision application access; update app roles and groups; coordinate onboarding timing with class managers and HR; troubleshoot class-related access expirations and day-one issues. | ServiceNow, Active Directory, application admin consoles, Outlook, Teams | New hires, HR, hiring managers, trainers, UAM/AD peers | Improves onboarding readiness by coordinating earlier with stakeholders and shaping smoother access setup for incoming classes. | Provisioning and joiner-process execution with operational rigor, stakeholder coordination, and control-minded access validation. | ||||||||||||||||
5 | Core Role - Incident & Operational Support | Medium-High | 10% | Troubleshoot access issues, incidents, and improper provisioning with security and service impact in mind | Resolve access-related incidents and user-impacting issues by diagnosing group, workflow, and entitlement problems, correcting mis-provisioning, and restoring appropriate access without bypassing controls. | Investigate group-management issues; respond to change/incident tickets; correct improper access; instruct users on how to use access; join calls for escalations and training-class issues. | ServiceNow, Active Directory, application admin tools, Teams, Outlook | End users, training classes, managers, service desk, app contacts | Balances user support with control integrity by solving access problems without weakening approval or entitlement standards. | Access incident response and entitlement troubleshooting in regulated operational environments. | ||||||||||||||||
6 | Core Role - Queue & Service Operations | Medium | 10% | Monitor SC Task and incident queues while managing backlog health and workflow continuity | Provide operational stability by monitoring queues, managing backlog, and helping ensure requests move through UAM workflows with appropriate prioritization, follow-up, and closure discipline. | Monitor SC Task queue; monitor Incident queue; follow up on aging items; coordinate closures; manage work distribution awareness; support queue hygiene. | ServiceNow, Outlook, Teams | UAM team, requesters, managers, dependent app teams | Contributes to team throughput and service reliability by keeping operational work visible, moving, and accountable. | Queue governance, operational coordination, and backlog management in identity/access support operations. | ||||||||||||||||
7 | Core Role - Application Governance | High | Embedded within core operations | Serve as a point of contact and co-owner across multiple Cenlar application workflows | Function as one of the main UAM contacts for application-related access questions, workflow issues, and complex request handling across the Cenlar environment, especially where deeper app familiarity is needed. | Act as 1 of 4 UAM members serving as a point of contact for all apps within the business; oversee workflows for apps where you have stronger experience; lead some app-related discussions; support co-owned applications. | Application admin portals, ServiceNow, Outlook, Teams, AD-connected systems | Business users, managers, app owners, UAM peers, Security | Operates as a trusted workflow lead even where formal ownership sits elsewhere, which demonstrates informal leadership and domain depth. | Application access governance, workflow stewardship, and cross-functional coordination across enterprise business applications. | ||||||||||||||||
8 | Core Role - Audit & Evidence Support | High | Embedded within core operations + reporting cycles | Produce audit-ready user access evidence and recurring reporting to support compliance and control validation | Prepare quarterly and ad hoc reporting that supports audits, recertification, and access-review needs by pulling user listings, organizing evidence, and helping show that provisioning and revocation controls operated as expected. | Issue quarterly reports for audit purposes; generate user role and access reports; support termination-related evidence requests; contribute to recertification outputs and user listing reviews. | Reporting exports, spreadsheets/CSV, application admin portals, ServiceNow, Outlook | Security analysts, auditors, compliance contacts, business reviewers | Turns operational IAM work into reviewable evidence that leaders and auditors can use to assess control effectiveness. | Audit evidence production, access review support, and control traceability for regulated IAM operations. | ||||||||||||||||
9 | Core Role - Documentation & Control Maturity | High | 10% | Update SOPs, KBs, and security documentation to align UAM processes with audit and framework expectations | Help modernize UAM and security procedures so they are current, repeatable, and defensible against NIST/ISO- and control-driven expectations, while improving readiness for SOX, HIPAA, PCI, SOC 2, and related reviews. | Revise UAM KB articles; update security documentation; document legal/compliance-sensitive procedures; improve future-hire readiness documents; standardize process language and evidence expectations. | Knowledge base articles, procedure documents, PolicyTech/SharePoint/OneDrive, Outlook, Teams | Security, UAM, auditors, new hires, managers | Expands beyond task execution into control formalization, helping shape how the team performs work—not just how individual tickets are completed. | Procedure governance, control documentation, and audit-ready SOP development for IAM and security-adjacent operations. | ||||||||||||||||
10 | Leadership & Enablement | Medium-High | Embedded within operations | Cross-train peers and support onboarding of new UAM/AD teammates and classes | Transfer operational knowledge to peers and new hires so the team can execute UAM and AD functions more consistently, with fewer gaps and faster ramp-up. | Cross-train peers in UAM functions; assist with onboarding new hire classes; help future UAM/AD hires be better prepared; guide users and teammates through recurring access workflows. | Teams, Outlook, SOPs, KB articles, training calls | UAM peers, AD counterparts, new hires, class managers | Demonstrates leadership through enablement, not just individual output, by making team knowledge more durable and scalable. | Peer mentorship, operational enablement, and process knowledge transfer in IAM/UAM environments. | ||||||||||||||||
11 | Leadership & Process Improvement | High | Project-based / recurring | Drive process improvement initiatives that reduce access friction and strengthen control consistency | Identify workflow gaps and collaborate with leads, vendors, and business stakeholders to improve how access is requested, created, and governed. | Partner with team lead on BITB group-creation workflow improvements between vendor and VP of IT; improve onboarding coordination with HR and class managers; refine troubleshooting pathways for class access issues. | Vendor communication, ServiceNow workflows, application access processes, Teams, Outlook | Team lead, vendor partners, VP/IT leadership, HR, class managers, end users | Shows initiative in redesigning processes, influencing upstream stakeholders, and improving how access operations scale. | Process improvement and workflow optimization across identity administration, vendor coordination, and onboarding operations. | ||||||||||||||||
12 | Security Positioning | Very High | Role-spanning | Translate IAM operations into security control support and compliance outcomes | Frame daily access administration work through a security lens by focusing on least privilege, timely deprovisioning, approval integrity, evidence retention, and operational support for control effectiveness. | Support access recertification; produce evidence for reviews; maintain documentation that explains control execution; escalate access concerns; align procedures to regulated-environment expectations. | AD, ServiceNow, audit reports, SOPs, reporting exports, security documentation | Security, auditors, business approvers, UAM leadership | Positions current work as foundational IAM/security analyst experience rather than purely administrative support. | Emerging IAM-focused security practitioner with hands-on access governance, evidence support, and documentation maturity experience. | ||||||||||||||||
13 | Extracurricular / Leadership Development | High | Outside core role | Develop under executive mentorship to transition toward an IAM-focused Security Analyst path | Actively invest in security career progression through mentorship and targeted positioning around IAM, access governance, audit readiness, and security operations maturity. | Serve as mentee to the Head of Cyber Security; seek exposure to broader security thinking; align current UAM work to long-term IAM Security Analyst goals. | Mentorship, self-development, security documentation, audit/compliance learning | Cybersecurity leadership, mentors, future hiring managers | Signals ambition, coachability, and deliberate development toward higher-scope security responsibilities. | Mentored IAM/UAM practitioner preparing for transition into security analyst responsibilities. | ||||||||||||||||
14 | Extracurricular / Leadership | Medium | Outside core role | Contribute organizational leadership through RISE Communications LEAD responsibilities | Expand influence outside day-to-day operations by taking on a communications-focused leadership role that strengthens visibility, coordination, and community impact across the organization. | RISE Communications LEAD role; leadership through communication, engagement, and visibility-building across employee initiatives. | Internal communications channels, meetings, collaboration tools | Employee community, RISE participants, organizational leaders | Adds leadership breadth and demonstrates that influence extends beyond technical operations into communication and culture-building. | Leadership and communications experience that complements technical IAM/security depth. | ||||||||||||||||
15 | Career Narrative | Very High | N/A | Position current role as a bridge from UAM/AD operations into IAM security analysis | Your role can be credibly described as security-relevant identity administration with growing ownership of controls, evidence, documentation, and cross-functional process leadership. | Connect UAM operations to access governance, control evidence, procedure maturity, and audit support when discussing your responsibilities with leaders or recruiters. | Career materials, interviews, internal conversations, development plans | People leaders, mentors, recruiters, security hiring managers | Helps others see you as operating above the narrow bounds of a support title and already functioning in a risk-aware IAM capacity. | IAM / UAM professional with leadership potential, technical depth, and a clear trajectory toward Security Analyst work. | ||||||||||||||||
16 | ||||||||||||||||||||||||||
17 | ||||||||||||||||||||||||||
18 | ||||||||||||||||||||||||||
19 | ||||||||||||||||||||||||||
20 | ||||||||||||||||||||||||||
21 | ||||||||||||||||||||||||||
22 | ||||||||||||||||||||||||||
23 | ||||||||||||||||||||||||||
24 | ||||||||||||||||||||||||||
25 | ||||||||||||||||||||||||||
26 | ||||||||||||||||||||||||||
27 | ||||||||||||||||||||||||||
28 | ||||||||||||||||||||||||||
29 | ||||||||||||||||||||||||||
30 | ||||||||||||||||||||||||||
31 | ||||||||||||||||||||||||||
32 | ||||||||||||||||||||||||||
33 | ||||||||||||||||||||||||||
34 | ||||||||||||||||||||||||||
35 | ||||||||||||||||||||||||||
36 | ||||||||||||||||||||||||||
37 | ||||||||||||||||||||||||||
38 | ||||||||||||||||||||||||||
39 | ||||||||||||||||||||||||||
40 | ||||||||||||||||||||||||||
41 | ||||||||||||||||||||||||||
42 | ||||||||||||||||||||||||||
43 | ||||||||||||||||||||||||||
44 | ||||||||||||||||||||||||||
45 | ||||||||||||||||||||||||||
46 | ||||||||||||||||||||||||||
47 | ||||||||||||||||||||||||||
48 | ||||||||||||||||||||||||||
49 | ||||||||||||||||||||||||||
50 | ||||||||||||||||||||||||||
51 | ||||||||||||||||||||||||||
52 | ||||||||||||||||||||||||||
53 | ||||||||||||||||||||||||||
54 | ||||||||||||||||||||||||||
55 | ||||||||||||||||||||||||||
56 | ||||||||||||||||||||||||||
57 | ||||||||||||||||||||||||||
58 | ||||||||||||||||||||||||||
59 | ||||||||||||||||||||||||||
60 | ||||||||||||||||||||||||||
61 | ||||||||||||||||||||||||||
62 | ||||||||||||||||||||||||||
63 | ||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 |