JustJoin.IT Praca zdalna Senior

Senior Security Analyst - Remote Poland (VL/TS/03.03.26\\DT)

DCV Technologies

⚲ Warszawa, Gdańsk, Wrocław, Kraków, Poznań

Wymagania

  • IAM, PAM, CyberArk
  • security requirements

Opis stanowiska

We are seeking a Senior Security Analyst to support Privileged Access Management (PAM) onboarding activities across Infrastructure, Applications, and Cloud environments. This role focuses on CyberArk onboarding coordination, privileged account analysis, and IAM security integration, ensuring proper privileged access governance aligned with defined onboarding patterns. Send CV to marcillina.tietjen@dcvtechnologies.co.uk if you are interested CORE RESPONSIBILITIES Privileged Account Analysis • Analyse privileged account onboarding status across:• Infrastructure • Applications • Cloud environments • Review automated scan results • Conduct questionnaire/interview-based analysis Onboarding Governance • Provide guidance to privileged account owners on defined onboarding patterns • Define required:• Groups • Shared accounts • Safes • Ensure compliance with onboarding standards CyberArk Implementation Coordination • Coordinate assigned CyberArk engineer(s) • Oversee implementation of:• Connectors • Plug-ins • Manage testing & onboarding validation • Coordinate sign-off process Stakeholder & Team Enablement • Support user teams onboarding to CyberArk • Conduct workshops and onboarding sessions • Collaborate with PAM Run Team • Manage task sequencing & cross-team coordination REQUIRED SKILLS & EXPERIENCE • 5+ years IT consulting experience • Experience integrating security requirements into IT solutions • Strong understanding of:• Identity & Access Management (IAM) • Privileged Access Management (PAM) • Hands-on / coordination experience with CyberArk • Analytical and organisational skills • Strong written & spoken English • German language – advantage CORE COMPETENCIES • CyberArk • Microsoft Identity and Access Management • Identity & Access Management Implementation • IAM Design & Architecture • Privileged Access Governance • Security Integration in Enterprise Environments