National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cybersecurity Business Analyst-Banking

Vallum Associates
Sheffield
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Cybersecurity Risk Analyst (Remote)

Cybersecurity Analyst

Senior Cybersecurity Risk Analyst

Cyber Security Analyst

Cyber Security Analyst

Senior Analyst, Cybersecurity Operations (Detection & Response)

Job Title: Cybersecurity Business Analyst
Location: Sheffield (3day/week onsite)
Duration: 06+ Months

Banking Client Experience Required

Job Description
-Should excel at eliciting and documenting requirements, mapping “as-is” and “to-be” access-management processes, conducting gap analysis, and producing clear reports and presentations for stakeholders. Strong communication skills to align Security, DevOps, and business teams, plus a data-driven mindset for analyzing IAM logs and evaluating risk.
-On the cloud side, they must understand IAM constructs in AWS (users, roles, policies, permission boundaries), Azure (Azure AD, RBAC, PIM), GCP (principals, roles, policy bindings), and Alibaba Cloud (RAM users, groups, roles, and policy management), as well as how Kubernetes RBAC (roles, bindings) integrates with cloud-native identities.
-Additionally, they should be familiar with SaaS identity management—SSO protocols (SAML, OAuth/OIDC), SCIM provisioning, and entitlement workflows—to identify gaps, over-privileged accounts, and recommend least-privilege controls across multi-cloud (including Ali Cloud) and SaaS environments.

Cloud-Specific IAM Knowledge (Required)
AWS IAM
In-depth understanding of IAM users/groups/roles/policies, permission boundaries, service-linked roles, and AWS Organizations (SCPs).
Hands-on experience reviewing existing IAM policies (JSON), detecting overly broad permissions (e.g., “*” or wildcard actions), and recommending fine-grained least-privilege models.
Azure Active Directory & Azure RBAC
Knowledge of Azure AD concepts: users, groups, applications/service principals, managed identities, Conditional Access policies.
Familiarity with Azure RBAC roles (built-in and custom) and PIM (Privileged Identity Management) best practices for just-in-time elevation.
GCP IAM
Understanding of GCP IAM constructs: Principals (Users, Service Accounts, Groups), Roles (primitive, predefined, custom), Service Account Keys, and Organization-level policies.
Experience reviewing IAM policy bindings (via GCP IAM or Terraform state) and recommending Organization/Folder/Project-level least-privilege structures.
Kubernetes RBAC & Cloud-Native Identities
Solid grasp of Kubernetes RBAC entities—Role, Cluster Role, Role Binding, ClusterRoleBinding—and how they map to Kubernetes API groups.
Awareness of how cloud-provider-managed Kubernetes (EKS, AKS, GKE) integrates with cloud IAM (for example, IAM Authenticator in EKS, GKE Workload Identity, Azure AD/Entra integration).
SaaS Application Identity Management
Familiarity with Single Sign-On (SSO) protocols (SAML, OAuth 2.0/OIDC) and identity providers (Azure AD, GCDS, AWS IAM).
Understanding of SCIM provisioning, user lifecycle workflows (onboarding/offboarding), and entitlement catalogue management for major SaaS (e.g., Office 365).
Required Skills & Experience:
5+ years as a Business Analyst (or similar) focused on IT security, governance, or IAM.
Hands-on experience mapping and documenting IAM processes in AWS, Azure, and GCP.
Practical knowledge of AWS IAM (users/roles/policies), Azure AD & RBAC, and GCP IAM (roles/bindings).
Familiarity with Kubernetes RBAC (Role Bindings, ClusterRoleBindings) and how those ties into cloud IAM (EKS, AKS, GKE).
Proven track record analysing SaaS-based identity integrations (e.g., SAML SSO, SCIM provisioning).
Strong gap-analysis skills, able to pinpoint missing or weak access controls.
Comfortable using cloud consoles, CLIs (AWS, Azure, GCP and Ali) and reviewing IaC (Terraform/CloudFormation) for IAM-related misconfigurations.
Excellent stakeholder management; able to facilitate cross-functional workshops and drive consensus.

Priyanka Sharma
Senior Delivery Consultant
Office:
Email:

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.