Cyber Engineer – Identity and Access Management (Omada) (RO) at Spyrosoft
Timișoara, Timiș, Romania -
Full Time


Start Date

Immediate

Expiry Date

26 Jul, 25

Salary

0.0

Posted On

26 Apr, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Analytical Skills, English, Compliance Regulations, Iso

Industry

Information Technology/IT

Description

REQUIREMENTS

  • Strong knowledge of Omada IAM solutions
  • Experience in managing identity and access management in large organizations
  • Familiarity with IAM standards and compliance regulations, such as GDPR and ISO
  • Ability to assess and mitigate risks associated with user access and permissions
  • Strong analytical skills
  • Effective communication and collaboration skills
  • Fluency in English

JOB DESCRIPTION

Our customer is a German company specializing in comprehensive IT solutions, supporting enterprises in their digital transformation. With extensive experience, it offers high-quality services that include IT infrastructure management, business applications, and modern workplace (Digital Workplace) solutions. The company focuses on long-term relationships, tailoring services to meet clients’ specific needs, ensuring stability, security, and innovation. They operate throughout Germany, with its primary goal being to help clients achieve long-term success in a dynamic technological landscape. The company serves a wide range of clients, including large enterprises and organizations with complex IT needs and provides modern IT infrastructures and scalable cloud solutions, such as SAP and AI, customized to clients’ requirements. Our customer operates as a dynamic IT service provider, supporting the digital transformation of the German economy.

Responsibilities
  • Implement and manage Identity and Access Management (IAM) solutions using Omada technology.
  • Configure IAM policies and workflows to align with organizational security requirements.
  • Monitor and audit user access to ensure compliance with IAM policies.
  • Conduct periodic reviews of user permissions and access levels.
  • Collaborate with IT and security teams to integrate IAM with existing systems and applications.
  • Develop and maintain documentation for IAM processes and procedures.
Loading...