IT Security Specialist One of our clients is currently looking for a CORPORATE IT SECURITY SPECIALIST to join their team. Name of the position: Corporate IT Security Specialist. Location: UK, Spain, Portugal, Poland, Italy. Work model: Remote The IT Security Specialist PAM will be responsible for the solution planning, architecture, development, delivery, and support of Beyond Trust Password Safe. Reporting to the IT Security Administration Lead, this role will be responsible for the overall strategy, planning, development & support of PAM solution and its associated processes. The IT Security Specialist will provide support to the IAM and Privileged Access Management (PAM) functions across the organization. This role will also be responsible for resolving technical issues in the PAM platform through problem tracking, diagnosis and root-cause analysis, replication, troubleshooting, and resolution for moderately complex issues. Knowledge & Skills Strong understanding on Identity and Privileged constructs within Cloud environments. Advance working knowledge of and/or implementation experience of Beyond Trust and its core architecture. Able to build trusting relationships and work collaboratively across teams, system integrators, and levels of leadership to accomplish goals for the PAM solution. Experience in designing and implementing PAM solutions such as (BeyondTrust, CyberArk, Lieberman, CA/Xceedium) for enterprise organizations. Strong understanding of Identity Lifecycle in regard to privileged accounts and how people use accounts. Demonstrate an advanced understanding of troubleshooting and configuring Privileged applications, Privileged ID Management, and API integrations. Exhibit strong critical thinking and problem-solving skills. Possess excellent written and verbal communication skills. Understand all PAM functions including but not limited to user entitlement reviews, service account life cycle management, environment hygiene, vaulting, break glass, and conflicting combinations. Operational Expectations Accurately maintain all documentation as it relates to configuration, processes, service records, asset inventories, topologies, administration manuals, job instructions, support contacts etc. Execute all project deliverables for the PAM solution on time. Establish/maintain PAM Security Strategy including provisioning, password management and access policies, SSH key management, API key management and reporting. Contribute to the design, development and maintenance of technology and security standards, policies and guidelines related to PAM. Drive the end-to-end process of on-boarding privileged accounts for critical applications and infrastructure components onto the PAM platform. Care for continuous service improvement & development activities including health-checks and upgrades. Perform PAM administration activities in accordance with security standards to ensure that passwords are accessible to appropriately authorized users only. Day-to-day activities include working with customer teams and supporting current tasks and activities. Manage incidents, service requests, and change tasks in the ITSM system of record. Provide training to technical groups around the support of PAM technologies. Develop, enhance, and maintain PAM automation processes and documentation utilized by other technicians and end users. Implement and provide direction for the IAM and Privileged Access Management (PAM) functions across the organization (including federation, privileged access management, authentication & authorization, security, and provisioning identity data). Qualifications/Requirements 7+ years Information Security experience with at least 3 of those years focused on Privileged Access Management Experience in administration of Beyond Trust Privilege Access Management (PAM) Experience with databases, LDAP and directory services, application servers, operating systems, PAM integrations and network infrastructure Fluent in English in both writing and speech.
foundit
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.