ACTIVELY SEEKING — GRC Analyst · IT Compliance Analyst · Information Security Analyst · Tampa Bay / Remote
GRC Analyst · Identity & Access Governance

Kender
Saint-Juste

Governance, Risk & Compliance · Security Policy · Identity Lifecycle · Tampa, FL

I protect organizations by governing who has access to what — and proving it to auditors. Specializing in GRC, identity lifecycle management, compliance framework mapping, and security policy development.

10+
YRS PROFESSIONAL EXP
200+
ENTERPRISE ACCOUNTS
4
GRC PORTFOLIO PROJECTS
Active
SECURITY+ IN PROGRESS
About

The Story

Long before I knew what GRC was called, I was already being shaped by it. My interest in law — in rules, evidence, and how systems are held accountable — was with me before I ever studied technology.

When I was at USF studying Information Science with a security concentration, I started researching career paths. The work described — safeguarding systems, developing security policies, access governance — wasn't just technical. It was governance. My degree was preparing me for it before I fully understood what that meant.

At TeamViewer I spent nearly five years in the work itself. Enterprise IT teams asking about access management and compliance. Then support — managing company profiles, provisioning and deprovisioning users, handling SOC 2 inquiries, setting up MFA, escalating SAML failures. Every day I saw governance problems disguised as technical tickets.

My B.S. in Information Science coursework in CIS 4365 (Security Policies, NIST CSF) and CIS 4361 (Information Security Management, CISSP-aligned) trained me directly for this work. I'm building hands-on Entra ID lab evidence, pursuing CompTIA Security+ SY0-701, and SC-300 next.

Quick Profile
🎓
B.S. Information ScienceUSF · InfoSec Concentration · 3.76 GPA
📚
M.S. Software Engineering (In Progress)Penn State World Campus
📍
Tampa, FloridaRemote-First · Hybrid Available · On-Site Last
🌐
TrilingualEnglish · French · Haitian Creole (all Native)
🏢
Founder, Juste™ LLCTampa, FL · Truth in Technology™
Skills

Technical Stack

Frameworks, tools, and platforms relevant to GRC and identity governance roles.

GRC & Compliance
Policy DevelopmentRisk AssessmentControl MappingAudit EvidenceGap Analysis
Identity & Access
RBACJML LifecycleLeast PrivilegeSSO/SAMLMFAEntra ID (Lab)Okta (Practicing)
Frameworks
NIST CSF 2.0SOC 2ISO 27001NIST 800-53CIS Controls v8HIPAA
Tools & Platforms
Vanta (Demo)Drata (Demo)Microsoft PurviewServiceNow GRCJiraZendeskSalesforce
Portfolio

GRC Projects

Audit-ready governance documentation, compliance policy work, and access control frameworks. Built to real standards — not theoretical exercises.

POLICY DOCUMENT
📄
BYOD & Password Security Policy
Authored a full cybersecurity policy whitepaper for a professional services firm. Mapped four identified vulnerabilities to NIST CSF 2.0 controls. Includes regulatory compliance table (Florida Bar Rule 1.6(c), FIPA, HIPAA, NIST SP 800-63B) and RBAC-based account lifecycle governance.
NIST CSF 2.0RBACHIPAAPolicy Writing
View Policy →
FRAMEWORK MAPPING
🗺️
NIST CSF → SOC 2 Control Crosswalk
Control crosswalk mapping NIST CSF 2.0 functions to SOC 2 Trust Services Criteria. Demonstrates how governance frameworks align in practice — the type of mapping used in real compliance gap assessments and audit preparation.
NIST CSF 2.0SOC 2Control MappingAudit Ready
View Crosswalk →
ACCESS GOVERNANCE
♻️
Joiner-Mover-Leaver (JML) Lifecycle Controls
Enterprise identity lifecycle workflows with approval paths, SLA targets, and provisioning/deprovisioning controls. Includes flow diagrams and evidence collection templates for access governance audits.
JMLISO 27001Audit Ready
View Project →
IAM GOVERNANCE
📋
RBAC & Quarterly Access Review Framework
Audit-ready quarterly access-review workflows incorporating evidence collection, exception handling, and least-privilege enforcement. Templates mapped to SOC 2 CC6.3 compliance evidence requirements.
RBACSOC 2 CC6Least Privilege
View Project →
Frameworks

Framework Fluency

Studied in USF coursework (CIS 4365 + CIS 4361) and actively applied in portfolio projects and compliance documentation.

NIST
NIST CSF 2.0
Govern · Identify · Protect · Detect · Respond · Recover
SOC 2
SOC 2 Type II
CC6 Access Controls · Trust Services Criteria · Audit Evidence
ISO
ISO 27001
ISMS Framework · Annex A Controls · A.5.15-A.5.18 IAM
CIS
CIS Controls v8
Control 5 (Account Mgmt) · Control 6 (Access Control)
800-53
NIST 800-53 Rev 5
AC Family · IA Family · AU Family
HIPAA
HIPAA Security Rule
Access Controls · Audit Controls · Transmission Security
Experience

Work History

10+ years of progressive professional experience, with IAM and security governance work throughout the last five years.

Customer Support Specialist — Enterprise IAM & Access GovernanceJan 2023 – Apr 2026
TeamViewer · Clearwater, FL
  • Executed Joiner-Mover-Leaver (JML) provisioning workflows for enterprise accounts, enforcing RBAC and least-privilege access controls to maintain compliance across complex authentication environments.
  • Performed technical triage on SSO/SAML authentication failures for 10–15 enterprise cases daily; resolved configuration blockers and coordinated with Level 2 engineering for final resolution.
  • Managed access provisioning/deprovisioning and SOC 2-aligned audit documentation; selected as Internal Security Champion in recognition of cross-functional security contributions.
  • Communicated complex authentication requirements, access control standards, and compliance obligations to enterprise IT stakeholders across 200+ enterprise accounts.
Inside Sales RepresentativeJan 2022 – Jan 2023
TeamViewer · Clearwater, FL
  • Assessed identity governance and access control requirements for enterprise IT stakeholders; communicated SSO compliance requirements and access control standards to technical and non-technical decision-makers.
Sales Development RepresentativeJun 2021 – Jan 2022
TeamViewer · Clearwater, FL
  • Conducted structured identity and access governance discovery across 200+ enterprise accounts, assessing remote access architectures, SSO configurations, and access control gaps.
Education

Academic Background

B.S. Information Science
University of South Florida · Dec 2023
Concentration: Information Security · Minor: Entrepreneurship · Major GPA: 3.76

Core security coursework: CIS 3360 (Principles of Information Security), CIS 4365 (Security Policies + NIST CSF), CIS 4361 (Info Security Management, CISSP-aligned), CIS 3367 (OS Security), CIS 4204 (Ethical Hacking — A+)
M.S. Software Engineering (In Progress)
Pennsylvania State University, World Campus
Completed: SWENG 861 (Software Construction — A), SWENG 887 (Software Systems Architecture), SWENG 886 (Requirements Engineering)

Certificate #1 target: Software Architecture & Design
Certifications
CompTIA Security+ SY0-701
IN PROGRESS · TARGET: SEPT 2026
Microsoft SC-300
PLANNED · AFTER SECURITY+
CISM
PLANNED · 2028-2029
Contact

Let's Connect

Actively seeking GRC Analyst, IT Compliance Analyst, and Information Security Analyst roles. Available for remote positions nationwide and hybrid roles in the Tampa Bay area.

Networking Card
Scan to open full portfolio instantly. Add to your phone for quick sharing at networking events.
QR code — career.usejuste.com
career.usejuste.com