ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Section
Security_Focus
Time Allocation Responsibility_FunctionDetailed_DescriptionTypical_Activities_ExamplesTools_Systems_InvolvedStakeholders_ServedLeadership_Ownership_AngleResume_Ready_Positioning
2
Core Role - Security/IAM OperationsHigh25%Lead termination and deprovisioning execution across AD and business applicationsOwn the operational side of identity offboarding by removing or disabling access in on-prem AD and downstream applications, validating completion, and helping ensure terminated users do not retain orphaned access.Process termination tickets; remove shared drive, mailbox, SSO/SAML, app, and group access; confirm completion with peers/app contacts; support follow-up calls on recent production terminations; provide ad hoc termination reporting.Active Directory, ServiceNow, SaaS/admin portals, Outlook, TeamsManagers, Security, UAM peers, application teams, auditorsActs as a reliable control point for timely access revocation and helps drive completion across multiple teams and systems.Identity lifecycle / deprovisioning control execution with security risk reduction and audit traceability.
3
Core Role - Access AdministrationHigh25%Administer AD entitlements and core access changes for shared drives, mailboxes, and group-based accessPerform day-to-day access administration in the on-prem AD environment, translating approved requests into accurate entitlement changes while maintaining least-privilege alignment and business continuity.Add/remove shared drive permissions; mailbox access changes; update AD security groups; maintain SSO/SAML-linked groups; adjust access for role changes and exceptions.Active Directory, Exchange/mailbox administration, SSO/SAML group mappings, ServiceNowEnd users, managers, app owners, service desk, SecurityOwns high-volume entitlement changes with strong accuracy expectations and serves as a go-to operator for access-sensitive work.Access administration and entitlement management across AD and federated application environments.
4
Core Role - Provisioning & OnboardingHigh20%Provision new hire and app access requests with approval-aware control disciplineCreate and update user access for new hires and role changes, ensuring provisioning follows documented workflows, approvals, and application-specific requirements rather than informal copying of access.Work new hire tickets; provision application access; update app roles and groups; coordinate onboarding timing with class managers and HR; troubleshoot class-related access expirations and day-one issues.ServiceNow, Active Directory, application admin consoles, Outlook, TeamsNew hires, HR, hiring managers, trainers, UAM/AD peersImproves onboarding readiness by coordinating earlier with stakeholders and shaping smoother access setup for incoming classes.Provisioning and joiner-process execution with operational rigor, stakeholder coordination, and control-minded access validation.
5
Core Role - Incident & Operational SupportMedium-High10%Troubleshoot access issues, incidents, and improper provisioning with security and service impact in mindResolve access-related incidents and user-impacting issues by diagnosing group, workflow, and entitlement problems, correcting mis-provisioning, and restoring appropriate access without bypassing controls.Investigate group-management issues; respond to change/incident tickets; correct improper access; instruct users on how to use access; join calls for escalations and training-class issues.ServiceNow, Active Directory, application admin tools, Teams, OutlookEnd users, training classes, managers, service desk, app contactsBalances user support with control integrity by solving access problems without weakening approval or entitlement standards.Access incident response and entitlement troubleshooting in regulated operational environments.
6
Core Role - Queue & Service OperationsMedium10%Monitor SC Task and incident queues while managing backlog health and workflow continuityProvide operational stability by monitoring queues, managing backlog, and helping ensure requests move through UAM workflows with appropriate prioritization, follow-up, and closure discipline.Monitor SC Task queue; monitor Incident queue; follow up on aging items; coordinate closures; manage work distribution awareness; support queue hygiene.ServiceNow, Outlook, TeamsUAM team, requesters, managers, dependent app teamsContributes to team throughput and service reliability by keeping operational work visible, moving, and accountable.Queue governance, operational coordination, and backlog management in identity/access support operations.
7
Core Role - Application GovernanceHighEmbedded within core operationsServe as a point of contact and co-owner across multiple Cenlar application workflowsFunction as one of the main UAM contacts for application-related access questions, workflow issues, and complex request handling across the Cenlar environment, especially where deeper app familiarity is needed.Act as 1 of 4 UAM members serving as a point of contact for all apps within the business; oversee workflows for apps where you have stronger experience; lead some app-related discussions; support co-owned applications.Application admin portals, ServiceNow, Outlook, Teams, AD-connected systemsBusiness users, managers, app owners, UAM peers, SecurityOperates as a trusted workflow lead even where formal ownership sits elsewhere, which demonstrates informal leadership and domain depth.Application access governance, workflow stewardship, and cross-functional coordination across enterprise business applications.
8
Core Role - Audit & Evidence SupportHighEmbedded within core operations + reporting cyclesProduce audit-ready user access evidence and recurring reporting to support compliance and control validationPrepare quarterly and ad hoc reporting that supports audits, recertification, and access-review needs by pulling user listings, organizing evidence, and helping show that provisioning and revocation controls operated as expected.Issue quarterly reports for audit purposes; generate user role and access reports; support termination-related evidence requests; contribute to recertification outputs and user listing reviews.Reporting exports, spreadsheets/CSV, application admin portals, ServiceNow, OutlookSecurity analysts, auditors, compliance contacts, business reviewersTurns operational IAM work into reviewable evidence that leaders and auditors can use to assess control effectiveness.Audit evidence production, access review support, and control traceability for regulated IAM operations.
9
Core Role - Documentation & Control MaturityHigh10%Update SOPs, KBs, and security documentation to align UAM processes with audit and framework expectationsHelp modernize UAM and security procedures so they are current, repeatable, and defensible against NIST/ISO- and control-driven expectations, while improving readiness for SOX, HIPAA, PCI, SOC 2, and related reviews.Revise UAM KB articles; update security documentation; document legal/compliance-sensitive procedures; improve future-hire readiness documents; standardize process language and evidence expectations.Knowledge base articles, procedure documents, PolicyTech/SharePoint/OneDrive, Outlook, TeamsSecurity, UAM, auditors, new hires, managersExpands beyond task execution into control formalization, helping shape how the team performs work—not just how individual tickets are completed.Procedure governance, control documentation, and audit-ready SOP development for IAM and security-adjacent operations.
10
Leadership & EnablementMedium-HighEmbedded within operationsCross-train peers and support onboarding of new UAM/AD teammates and classesTransfer operational knowledge to peers and new hires so the team can execute UAM and AD functions more consistently, with fewer gaps and faster ramp-up.Cross-train peers in UAM functions; assist with onboarding new hire classes; help future UAM/AD hires be better prepared; guide users and teammates through recurring access workflows.Teams, Outlook, SOPs, KB articles, training callsUAM peers, AD counterparts, new hires, class managersDemonstrates leadership through enablement, not just individual output, by making team knowledge more durable and scalable.Peer mentorship, operational enablement, and process knowledge transfer in IAM/UAM environments.
11
Leadership & Process ImprovementHighProject-based / recurringDrive process improvement initiatives that reduce access friction and strengthen control consistencyIdentify workflow gaps and collaborate with leads, vendors, and business stakeholders to improve how access is requested, created, and governed.Partner with team lead on BITB group-creation workflow improvements between vendor and VP of IT; improve onboarding coordination with HR and class managers; refine troubleshooting pathways for class access issues.Vendor communication, ServiceNow workflows, application access processes, Teams, OutlookTeam lead, vendor partners, VP/IT leadership, HR, class managers, end usersShows initiative in redesigning processes, influencing upstream stakeholders, and improving how access operations scale.Process improvement and workflow optimization across identity administration, vendor coordination, and onboarding operations.
12
Security PositioningVery HighRole-spanningTranslate IAM operations into security control support and compliance outcomesFrame daily access administration work through a security lens by focusing on least privilege, timely deprovisioning, approval integrity, evidence retention, and operational support for control effectiveness.Support access recertification; produce evidence for reviews; maintain documentation that explains control execution; escalate access concerns; align procedures to regulated-environment expectations.AD, ServiceNow, audit reports, SOPs, reporting exports, security documentationSecurity, auditors, business approvers, UAM leadershipPositions current work as foundational IAM/security analyst experience rather than purely administrative support.Emerging IAM-focused security practitioner with hands-on access governance, evidence support, and documentation maturity experience.
13
Extracurricular / Leadership DevelopmentHighOutside core roleDevelop under executive mentorship to transition toward an IAM-focused Security Analyst pathActively invest in security career progression through mentorship and targeted positioning around IAM, access governance, audit readiness, and security operations maturity.Serve as mentee to the Head of Cyber Security; seek exposure to broader security thinking; align current UAM work to long-term IAM Security Analyst goals.Mentorship, self-development, security documentation, audit/compliance learningCybersecurity leadership, mentors, future hiring managersSignals ambition, coachability, and deliberate development toward higher-scope security responsibilities.Mentored IAM/UAM practitioner preparing for transition into security analyst responsibilities.
14
Extracurricular / LeadershipMediumOutside core roleContribute organizational leadership through RISE Communications LEAD responsibilitiesExpand influence outside day-to-day operations by taking on a communications-focused leadership role that strengthens visibility, coordination, and community impact across the organization.RISE Communications LEAD role; leadership through communication, engagement, and visibility-building across employee initiatives.Internal communications channels, meetings, collaboration toolsEmployee community, RISE participants, organizational leadersAdds leadership breadth and demonstrates that influence extends beyond technical operations into communication and culture-building.Leadership and communications experience that complements technical IAM/security depth.
15
Career NarrativeVery HighN/APosition current role as a bridge from UAM/AD operations into IAM security analysisYour role can be credibly described as security-relevant identity administration with growing ownership of controls, evidence, documentation, and cross-functional process leadership.Connect UAM operations to access governance, control evidence, procedure maturity, and audit support when discussing your responsibilities with leaders or recruiters.Career materials, interviews, internal conversations, development plansPeople leaders, mentors, recruiters, security hiring managersHelps others see you as operating above the narrow bounds of a support title and already functioning in a risk-aware IAM capacity.IAM / UAM professional with leadership potential, technical depth, and a clear trajectory toward Security Analyst work.
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100