Professional Summary
GRC Analyst and information security professional specializing in identity governance, risk management, and compliance frameworks. Experienced in executing JML provisioning workflows, enforcing RBAC and least-privilege controls aligned to SOC 2, NIST CSF, and ISO 27001. Proven ability to develop auditable policies, perform risk assessments, and harmonize controls across multiple frameworks. Effective communicator translating complex security requirements for technical and non-technical stakeholders across 200+ enterprise accounts.
Professional Experience
TeamViewer · Clearwater, FL
- Executed Joiner-Mover-Leaver (JML) provisioning workflows for enterprise accounts, enforcing RBAC and least-privilege access controls to maintain compliance across complex authentication environments.
- Performed technical triage on SSO/SAML authentication failures for 10–15 enterprise cases daily; resolved configuration blockers and coordinated with Level 2 engineering for final resolution.
- Managed access provisioning/deprovisioning and SOC 2-aligned audit documentation; selected as Internal Security Champion in recognition of cross-functional security contributions.
- Communicated compliance obligations and security requirements to enterprise IT stakeholders and non-technical decision-makers; translated security risk into actionable guidance across 200+ accounts.
TeamViewer · Clearwater, FL
- Assessed identity governance and access control requirements for enterprise IT stakeholders across 30–50 monthly engagements; communicated SSO compliance and access control standards to technical and non-technical decision-makers.
TeamViewer · Clearwater, FL
- Conducted structured identity and access governance discovery across 200+ enterprise accounts, assessing remote access architectures, identity dependencies, SSO configurations, and access control gaps.
Identity & GRC Portfolio Projects
Microsoft Entra ID Practice Environment
April 2026–Present · github.com/KsaintJ/iam-grc-portfolio
Live Entra ID tenant: RBAC groups, Conditional Access policies (MFA enforcement, legacy auth blocking), simulated JML events, access review campaigns, audit log exports as governance evidence.
RBAC & Access Review Framework
2026
Audit-ready quarterly access-review workflows: evidence collection, exception handling, least-privilege enforcement aligned to SOC 2 CC6.
JML Lifecycle Controls + SSO/MFA Rollout Runbook
2025
Identity lifecycle workflows with approval paths, SLAs, deprovisioning controls. Phased MFA governance plan with break-glass procedures and compliance logging.