Job Description
About the Company
Nora Logic is a global IT and healthcare consulting firm that connects skilled professionals with leading organizations worldwide. This opportunity is with one of our U.S.-based technology partners, focused on managing privileged access and ensuring secure system governance.
Job Overview
We are seeking a detail-oriented and analytical professional to support privileged access management and security compliance. In this role, you will monitor access controls, review permissions, and ensure adherence to security policies.
Key Responsibilities
Manage and review privileged access across systems
Ensure proper implementation of role-based access control (RBAC)
Conduct access audits and compliance checks
Monitor access logs and identify anomalies
Collaborate with IT and security teams
Maintain documentation of access management processes
Support identity and access management (IAM) systems
Track access metrics and generate reports
Assist in remediation of access-related issues
Improve privileged access workflows
Required Qualifications
Bachelor’s degree in Computer Science, Information Technology, or related field
1–3 years of experience in IAM, access control, or IT security roles
Basic understanding of privileged access management concepts
Knowledge of authentication and authorization processes
Good analytical and problem-solving skills
Strong communication and documentation abilities
Preferred Qualifications
Experience with IAM tools (Okta, Azure AD, CyberArk)
Familiarity with security frameworks (NIST, ISO)
Basic knowledge of cybersecurity principles
Understanding of access governance and compliance
Relevant certifications such as Security+, CISA, or similar
Why Join Us?
Work with a leading U.S.-based technology organization
Gain hands-on experience in privileged access management
Supportive and collaborative work environment
Competitive salary and benefits
Opportunities for career growth in cybersecurity and IT governance
How to Apply
Submit an ATS-friendly resume highlighting your experience in privileged access, IAM tools, and relevant technical skills.