

Business Analyst
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Business Analyst in Sheffield (Hybrid) with a contract length of unspecified duration, offering £400/day inside IR35. Key skills include cloud-specific IAM knowledge across AWS, Azure, GCP, and Kubernetes, with 5+ years in IT security or governance required.
🌎 - Country
United Kingdom
💱 - Currency
£ GBP
-
💰 - Day rate
400
-
🗓️ - Date discovered
June 6, 2025
🕒 - Project duration
Unknown
-
🏝️ - Location type
Hybrid
-
📄 - Contract type
Inside IR35
-
🔒 - Security clearance
Unknown
-
📍 - Location detailed
Sheffield, England, United Kingdom
-
🧠 - Skills detailed
#Terraform #JSON (JavaScript Object Notation) #SAML (Security Assertion Markup Language) #Azure #Business Analysis #API (Application Programming Interface) #Security #AWS (Amazon Web Services) #Kubernetes #Infrastructure as Code (IaC) #IAM (Identity and Access Management) #DevOps #Cloud #AWS IAM (AWS Identity and Access Management) #GCP (Google Cloud Platform) #Azure Active Directory #SaaS (Software as a Service)
Role description
Heading 1
Heading 2
Heading 3
Heading 4
Heading 5
Heading 6
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.
Block quote
Ordered list
- Item 1
- Item 2
- Item 3
Unordered list
- Item A
- Item B
- Item C
Bold text
Emphasis
Superscript
Subscript
Location: UK - Sheffield (Hybrid)
Budget: £400/day, Inside IR35
BA - Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analysing IAM logs and evaluating risk. On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities. Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments.
Cloud-Specific IAM Knowledge (Required)
1. AWS IAM
• In-depth understanding of IAM users/groups/roles/policies, permission boundaries, service-linked roles, and AWS Organizations (SCPs).
• Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., “
• ” or wildcard actions), and recommending fine-grained least-privilege models.
1. Azure Active Directory & Azure RBAC
• Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies.
• Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation.
1. GCP IAM
• Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and Organization-level policies.
• Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organization/Folder/Project-level least-privilege structures.
1. Kubernetes RBAC & Cloud-Native Identities
• Solid grasp of Kubernetes RBAC entities—Role, Cluster Role, Role Binding, ClusterRoleBinding—and how they map to Kubernetes API groups.
• Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration).
1. SaaS Application Identity Management
• Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM).
• Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365).
Required Skills & Experience:
• 5+ years as a Business Analyst (or similar) focused on IT security, governance, or IAM.
• Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP.
• Practical knowledge of AWS IAM (users/roles/policies), Azure AD & RBAC, and GCP IAM (roles/bindings).
• Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE).
• Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning).
• Strong gap-analysis skills, able to pinpoint missing or weak access controls.
• Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/CloudFormation) for IAM-related misconfigurations.
• Excellent stakeholder management; able to facilitate cross-functional workshops and drive consensus