Skill Inventory Matrix
Enabler for Internal Mobility Program
Records
| ID | Sector | Division | Department | Unit | Technical Skills |
|---|---|---|---|---|---|
| 1122 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of Identity and Access Management (IAM) systems. | |
| 1123 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. | |
| 1124 | Risk Management | Cybersecurity | Identity and Access Management | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. | |
| 1125 | Risk Management | Cybersecurity | Identity and Access Management | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. | |
| 1126 | Risk Management | Cybersecurity | Identity and Access Management | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. | |
| 1127 | Risk Management | Cybersecurity | Identity and Access Management | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. | |
| 1128 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of Identity and Access Management (IAM) systems. |
| 1129 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1130 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1131 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1132 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1133 | Risk Management | Cybersecurity | Identity and Access Management | Access Control Operation | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1134 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of Identity and Access Management (IAM) systems. |
| 1135 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1136 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1137 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1138 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1139 | Risk Management | Cybersecurity | Identity and Access Management | Access Review and Audit | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1140 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of Identity and Access Management (IAM) systems. |
| 1141 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of regulatory requirements and best practices for IAM compliance and audit readiness. |
| 1142 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Knowledge of authentication and authorization technologies including multi-factor authentication (MFA), single sign-on (SSO), and federated identity management. |
| 1143 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to manage user lifecycle processes such as provisioning, deprovisioning, and periodic access certification. |
| 1144 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to design and manage automated IAM workflows for access requests, approvals, and role assignments. |
| 1145 | Risk Management | Cybersecurity | Identity and Access Management | Third Party Access Management | Ability to apply IAM frameworks and standards such as least privilege, role-based access control (RBAC), and zero trust models. |
| 1195 | Risk Management | Data Management Office | Data Governance Office | Ability to define and enforce data access policies using role-based models and ensure integration with Identity and Access Management (IAM) systems. | |
| 1201 | Risk Management | Data Management Office | Data Governance Office | Meta Data Management | Ability to define and enforce data access policies using role-based models and ensure integration with Identity and Access Management (IAM) systems. |
| 1207 | Risk Management | Data Management Office | Data Governance Office | Reference Master Data Management | Ability to define and enforce data access policies using role-based models and ensure integration with Identity and Access Management (IAM) systems. |
| 1213 | Risk Management | Data Management Office | Data Governance Office | Data Governance Compliance | Ability to define and enforce data access policies using role-based models and ensure integration with Identity and Access Management (IAM) systems. |
| 1217 | Risk Management | Data Management Office | Personal Data Protection Office | Knowledge of Identity and Access Management (IAM) and Privileged Access Management (PAM) systems to enforce role-based access controls and secure data environments. | |
| 1222 | Risk Management | Data Management Office | Personal Data Protection Office | Data Protection Compliance | Knowledge of Identity and Access Management (IAM) and Privileged Access Management (PAM) systems to enforce role-based access controls and secure data environments. |
| 1227 | Risk Management | Data Management Office | Personal Data Protection Office | Data Protection Operations | Knowledge of Identity and Access Management (IAM) and Privileged Access Management (PAM) systems to enforce role-based access controls and secure data environments. |