

netPolarity, Inc. (Saicon Consultants, Inc.)
Business Analyst
⭐ - Featured Role | Apply direct with Data Freelance Hub
This role is for a Business Analyst on a 6-month contract, paying "pay rate". The position requires 5+ years of experience in IT or cybersecurity projects, expertise in PAM, and strong skills in requirements gathering and process mapping. Remote work is available.
🌎 - Country
United States
💱 - Currency
$ USD
-
💰 - Day rate
544
-
🗓️ - Date
October 11, 2025
🕒 - Duration
More than 6 months
-
🏝️ - Location
Unknown
-
📄 - Contract
Unknown
-
🔒 - Security
Unknown
-
📍 - Location detailed
Durham, NC
-
🧠 - Skills detailed
#Business Analysis #Cybersecurity #Security #Requirements Gathering #MDM (Master Data Management) #Deployment #Agile #Documentation #Compliance #GDPR (General Data Protection Regulation) #IAM (Identity and Access Management)
Role description
Seeking an experienced and detail-oriented Business Analyst for a 6-month contract to support our Privileged Access Management (PAM) and Mobile Device Management implementation projects. This role is crucial for ensuring that our PAM and MDM deployment aligns with business objectives, meets compliance requirements, and is successfully adopted across the organization.
The ideal candidate will act as the primary liaison between cybersecurity, IT infrastructure teams, and various business units. You will be responsible for translating business needs into detailed technical requirements, redesigning access management processes, and supporting the overall change management process. Your work will be foundational to building a secure, efficient, and user-friendly privileged access control environment.
Key Responsibilities
1. Requirements:
• Conduct workshops and interviews with stakeholders to gather, analyze, and validate business requirements for privileged access.
• Create detailed functional and non-functional requirements documents to guide the technical team in configuring the PAM solution.
• Map current ("as-is") and design future ("to-be") business processes for privileged access request, approval, usage, and revocation.
1. Process Analysis and Workflow Design:
• Analyze existing access control workflows to identify security gaps, operational inefficiencies, and areas for improvement.
• Collaborate with technical lead and business owners to design secure, streamlined workflows within PAM & MDM
• Define requirements for integrating the PAM solution with other enterprise systems, such as ITSM platforms (e.g., ServiceNow) for ticketing and approval flows.
1. Stakeholder Collaboration and Communication:
• Serve as the key bridge between the business and the IT/security implementation team, translating technical complexities into business impact and vice versa.
• Work with business leaders to define project scope and objectives, ensuring the PAM solution mitigates the most critical risks.
• Facilitate regular meetings between security architects, IT administrators, and business unit leaders to ensure alignment on project goals and progress.
1. Risk, Compliance, and Change Management:
• Ensure that the defined requirements and processes align with internal security policies and external regulatory frameworks (e.g., SOX, GDPR).
• Assist in developing audit checklists and provide clear documentation to support internal and external audit processes.
• Contribute to the creation of training materials and user documentation to support change management and drive user adoption of new PAM processes.
Required Skills and Qualifications
• 5+ years of experience as a Business Analyst, with a proven track record of working on large-scale IT or cybersecurity projects.
• Demonstrable experience in requirements gathering, process mapping (as-is/to-be), and creating detailed functional specifications.
• Strong understanding of Identity and Access Management (IAM) principles and, specifically, Privileged Access Management (PAM) concepts.
• Excellent analytical, problem-solving, and stakeholder management skills.
• Ability to communicate effectively with both technical and non-technical audiences.
Preferred Qualifications
• Hands-on experience as a Business Analyst on a CyberArk or other enterprise PAM solution implementation.
• Familiarity with discovering and classifying different types of privileged credentials (e.g., service accounts, local admin accounts, application accounts).
• Experience working with compliance and regulatory frameworks such as SOX, HIPAA, or GDPR.
• Experience with Agile or hybrid project methodologies.
• Knowledge of ITSM tools and their integration with security platforms.
Seeking an experienced and detail-oriented Business Analyst for a 6-month contract to support our Privileged Access Management (PAM) and Mobile Device Management implementation projects. This role is crucial for ensuring that our PAM and MDM deployment aligns with business objectives, meets compliance requirements, and is successfully adopted across the organization.
The ideal candidate will act as the primary liaison between cybersecurity, IT infrastructure teams, and various business units. You will be responsible for translating business needs into detailed technical requirements, redesigning access management processes, and supporting the overall change management process. Your work will be foundational to building a secure, efficient, and user-friendly privileged access control environment.
Key Responsibilities
1. Requirements:
• Conduct workshops and interviews with stakeholders to gather, analyze, and validate business requirements for privileged access.
• Create detailed functional and non-functional requirements documents to guide the technical team in configuring the PAM solution.
• Map current ("as-is") and design future ("to-be") business processes for privileged access request, approval, usage, and revocation.
1. Process Analysis and Workflow Design:
• Analyze existing access control workflows to identify security gaps, operational inefficiencies, and areas for improvement.
• Collaborate with technical lead and business owners to design secure, streamlined workflows within PAM & MDM
• Define requirements for integrating the PAM solution with other enterprise systems, such as ITSM platforms (e.g., ServiceNow) for ticketing and approval flows.
1. Stakeholder Collaboration and Communication:
• Serve as the key bridge between the business and the IT/security implementation team, translating technical complexities into business impact and vice versa.
• Work with business leaders to define project scope and objectives, ensuring the PAM solution mitigates the most critical risks.
• Facilitate regular meetings between security architects, IT administrators, and business unit leaders to ensure alignment on project goals and progress.
1. Risk, Compliance, and Change Management:
• Ensure that the defined requirements and processes align with internal security policies and external regulatory frameworks (e.g., SOX, GDPR).
• Assist in developing audit checklists and provide clear documentation to support internal and external audit processes.
• Contribute to the creation of training materials and user documentation to support change management and drive user adoption of new PAM processes.
Required Skills and Qualifications
• 5+ years of experience as a Business Analyst, with a proven track record of working on large-scale IT or cybersecurity projects.
• Demonstrable experience in requirements gathering, process mapping (as-is/to-be), and creating detailed functional specifications.
• Strong understanding of Identity and Access Management (IAM) principles and, specifically, Privileged Access Management (PAM) concepts.
• Excellent analytical, problem-solving, and stakeholder management skills.
• Ability to communicate effectively with both technical and non-technical audiences.
Preferred Qualifications
• Hands-on experience as a Business Analyst on a CyberArk or other enterprise PAM solution implementation.
• Familiarity with discovering and classifying different types of privileged credentials (e.g., service accounts, local admin accounts, application accounts).
• Experience working with compliance and regulatory frameworks such as SOX, HIPAA, or GDPR.
• Experience with Agile or hybrid project methodologies.
• Knowledge of ITSM tools and their integration with security platforms.