Together, we can reinvent your business
The five main phases of onboarding are as follows:
- Plan: This consists of project planning and defining roles and responsibilities.
- Architect: This typically looks like creating a business process design and update plan so it reflects this.
- Configuration Prototype: This is where you draft up your training strategy.
- Testing: Mostly end-to-end testing and testing the customer requirements after changes are made.
- Going Live: Training gets carried out and the project reaches a conclusion.
Comprehensive Employee Onboarding & JMLT (Joiner, Mover, Leaver, Transfer)
Exploring joiners, movers, and leavers
STAGE 1 – JOINERS (onboarding)
Initiates identity creation for new hires, ensuring they receive essential access to perform their roles effectively.
STAGE 2 – MOVERS (transfers)
Updates access rights for employees transitioning to new roles, ensuring their access aligns with their current position.
STAGE 3 – LEAVERS (offboarding)
Removes access rights and disables or deletes accounts for employees exiting the organization.

Why Choose Employee Onboarding & JMLT (Joiner, Mover, Leaver, Transfer)
- Proactive defense against emerging threats.
- Tailored solutions that align with your goals and industry.
- Increased organizational resilience and readiness.
- Support for achieving and maintaining regulatory compliance.
Our Employee Onboarding & JMLT (Joiner, Mover, Leaver, Transfer) Process
As employees progress through their life cycle within your organization, the focus shifts from enabling productivity to safeguarding your company’s data. A poorly defined and executed joiner process not only delays new employees from reaching their potential value but also increases the likelihood of them being dissatisfied due to a poor user experience. Research indicates that a strong onboarding process improved new hire retention by 82%.
Similarly, failing to execute the leaver process on time and consistently poses major security risks for your company, especially considering the prevalence of SaaS applications. Studies reveal that at least one in three former employees retain access to systems or data even after leaving their company.
Therefore, automation of JML processes is critical to mitigating access risks and ensuring seamless transitions for employees.

Understanding Your Security Needs and Goals
Imagine a scenario where a newly hired employee joins a company. As soon as HR creates their record, automation begins. The employee’s details, such as job title, department, and manager, are synchronized automatically with the IAM system. This triggers a series of automated actions based on predefined rules or mappings. Consequently, the new employee gains access to specific applications tailored to their role and department without manual intervention.
Now, consider the offboarding of an employee from the organization. As soon as HR marks them as a departing employee, automation kicks in again. Their account is promptly disabled, revoking all access granted during their tenure. This ensures that no lingering permissions pose a security risk to the company’s data or systems.
But what about changes during an employee’s tenure? Automation has that covered too. Whether an employee receives a promotion or undergoes a change in responsibilities, any updates made in the HR system propagate throughout the organization’s infrastructure. Consequently, access rights are automatically adjusted to align with the employee’s changed role. This ensures they possess the necessary tools and permissions to excel in their updated position.

Uncovering Gaps and Vulnerabilities
Once we have a clear picture of your environment, we conduct a detailed analysis to identify gaps and vulnerabilities. This step involves evaluating potential risks in your systems, processes, and policies to uncover areas that could expose your organization to cyber threats.

Crafting a Tailored Security Strategy
Based on our findings, we develop a comprehensive strategic security framework tailored to your unique needs. This plan includes actionable recommendations, technology roadmaps, and priority areas to address potential weaknesses while supporting long-term resilience.

Implementing Solutions for Stronger Protection
During the execution phase, we provide end-to-end support for the implementation of security measures. This includes deploying necessary technologies, configuring systems, and delivering training to empower your team with the skills and knowledge to maintain a strong security posture.

Ensuring Continuous Security Improvement
Cybersecurity is a continuous journey. Our experts work with you to monitor your security environment, refine strategies, and adapt to emerging threats. We help you implement ongoing improvements to ensure your defenses remain robust and effective.
Take the First Step Toward Enhanced Cybersecurity
Protect your business, safeguard your data, and build resilience against evolving threats with FalconRock’s expert cybersecurity solutions.
Cybersecurity Consulting in Action
Joiner Mover Leaver (JML) security consulting services refer to a specialized area of cybersecurity consulting that focuses on managing employee access controls throughout their entire lifecycle within a company, including when they join (joiners), move to a new role (movers), and leave the organization (leavers), ensuring appropriate access levels are granted and revoked at each stage to mitigate security risks.
- Access Provisioning:
Setting up proper access rights for new employees when they join, based on their role and responsibilities, including system access, network access, and application permissions.
- Access Review and Adjustment:
Regularly reviewing and updating employee access levels when they move to a new department or role within the company, ensuring they only have access to the systems and data required for their new position.
- Access De-provisioning:
Revoking all access privileges for employees upon departure, including removing them from system accounts and disabling network access to prevent unauthorized access after termination.
- Reduced Security Risks:
By proactively managing access throughout the employee lifecycle, companies can minimize the risk of data breaches and insider threats associated with inappropriate access levels.
- Improved Compliance:
JML practices help organizations comply with various data privacy and security regulations by ensuring proper access controls are in place.
- Enhanced Efficiency:
Automating JML processes can streamline onboarding and offboarding procedures, reducing administrative burden on IT teams.
- Assess current access management practices:
Evaluate existing processes for onboarding, role changes, and offboarding to identify potential security gaps.
- Develop a JML strategy:
Design a comprehensive plan to manage employee access throughout their lifecycle, including policies, procedures, and automated workflows.
- Implement Identity and Access Management (IAM) solutions:
Select and configure IAM tools to automate the provisioning and de-provisioning of user access based on employee lifecycle events.
- Conduct access reviews:Regularly review employee access rights to ensure they are still appropriate for their current role and responsibilities.
McKesson Healthcare, for 2024, reported revenues of $309 billion and employed approximately 51,000 people. McKesson partnered with IBM to develop the McKesson Performance Advisor (MPA), a clinical-based, business predictive analytics/intelligence software solution.
Harvard Pilgrim Health Care (HPHC), as of 2023 reported annual revenues of approximately $2.23 billion, aimed to enhance the CASR II Datawarehouse with a Strategic End-to End Assessment. This project established the strategy and comprehensive requirements the CIO needed to define, develop, and operationalize all business and technical procedures to ensure end-to-end reliability and recoverability of data exchange and integration.
Biogen, a leading biotechnology company, As of 2023, Biogen reported annual revenues of approximately $9.836 billion with about 7500 employees, aimed to enhance its Commercial IT data warehouses to improve data management, reporting capabilities, and overall operational efficiency to support the Asia-Pacific (APAC) region and the US business unit.