"The identity and access management (IAM) space is exploding as organizations tighten security and compliance. A Business Analyst who can bridge technical IAM solutions with business needs is in high demand right now. This role offers a unique C2C contract opportunity in a hybrid setting, perfect for professionals with the right visa status.\n\n# Job Summary\nWe are seeking an IAM Business Analyst to partner with security and IT teams, gather requirements, and translate them into functional specifications for IAM solutions. The role involves stakeholder interviews, process mapping, and ensuring compliance with access policies while working on\u2011site in Wilmington, MA and remotely.\n\n# Top 3 Critical Skills Table\n| Skill | Why it's critical | Mastery Level |\n|-------|-------------------|--------------|\n| Identity & Access Management (IAM) | Core domain; drives all solution design and compliance | Senior |\n| Business Analysis & Requirements Gathering | Translates business needs into technical specs | Mid |\n| Stakeholder Communication | Aligns security, IT, and business units to ensure adoption | Senior |\n\n# Interview Preparation\n1. **Explain the end\u2011to\u2011end lifecycle of a user identity in an IAM system.** *What the interviewer is looking for:* Understanding of provisioning, authentication, authorization, and de\u2011provisioning.\n2. **How do you gather and prioritize IAM requirements from multiple business units?** *What the interviewer is looking for:* Structured BA techniques (interviews, workshops, MoSCoW) and conflict resolution.\n3. **Describe a time you identified a compliance gap in access controls and how you resolved it.** *What the interviewer is looking for:* Real\u2011world risk mitigation and change\u2011management experience.\n4. **What metrics would you track to measure the success of an IAM implementation?** *What the interviewer is looking for:* KPIs such as provisioning time, orphaned accounts, audit findings.\n5. **How would you handle a request for privileged access that conflicts with segregation\u2011of\u2011duties policies?** *What the interviewer is looking for:* Policy enforcement, risk assessment, and exception workflow knowledge.\n\n# Resume Optimization\n- IAM (Identity & Access Management)\n- Business Analyst\n- Requirements Gathering\n- Process Mapping\n- Stakeholder Management\n- Compliance & Auditing\n- Access Provisioning\n- Risk Assessment\n- Hybrid Work Model\n- C2C Contract\n\n# Application Strategy\nWhen you email the recruiter, start with a brief greeting, attach your resume, and clearly reference the IAM Business Analyst role. Highlight your top skills\u2014especially IAM expertise, business analysis experience, and stakeholder communication. Mention any relevant projects where you delivered IAM solutions or improved access controls, and tie those achievements directly to the responsibilities listed in the job description.\n\n# Career Roadmap\n| Current Role | Typical Experience | Core Focus | Next Position |\n|--------------|-------------------|------------|---------------|\n| IAM Business Analyst (Entry) | 2\u20113 years in BA or IT security | Requirement gathering, process design | Senior IAM Business Analyst |\n| Senior IAM Business Analyst | 4\u20116 years, leading large IAM projects | Strategy, governance, cross\u2011functional leadership | IAM Program Manager |\n| IAM Program Manager | 7\u201110 years, portfolio oversight | End\u2011to\u2011end IAM program delivery, budgeting | Director of Identity & Access Management |\n"