Cyber security is an extremely important part of our work in telecommunications, as we prioritize the protection of our customers data. We watch the network 24/7 and monitor anomalies while protecting your Critical Infrastructure. We prevent and respond immediately to all threats. We impact the security of millions of our network users every day by providing them with the highest level of security services.
We take a strategic and global approach to security, countering hacking attacks, creating a unique environment for the emergence of new and innovative solutions and products in fraud detection, cyber threats and business process monitoring.
responsibilities :
Build and manage IAM services in a complex environment
Analyze and design robust processes involving identity management
Solve technical challenges arising during the implementation
Develop integration with PAM environments and with other systems
Propose new areas for process optimization related to IAM solutions
Evaluate current Identity and Access Management solutions and when necessary apply new systems or solutions
Review security, performance and configuration of existing IAM implementations
requirements-expected :
5+ years of prior demonstrable hands-on experience working with one of the industry-leading IAM solutions
Thorough understanding of Identity repositories such as at least two of: AD, AAD, AWS IAM, Okta)
Prior experience with design, architecture, installation, configuration and maintenance of IAM solutions
Strong understanding of SAML and OIDC
Demonstrable understanding of the Identity and Access Management security principles and technologies (ACLs, LDAP, RBAC, ABAC, MFA, SSO)
Good understanding of concepts like self-service, identity lifecycle, autoapproval, separation of duties, recertification
Self-discipline and time management skills, ability to work with little to no supervision
The capacity to comfortably converse on cyber security topics in a natural manner with both technical and non-technical audiences
A thorough understanding of Linux and Windows platform security models
Ability to write simple automation using one of the popular programming languages
Ability to create high quality documentation including models in for example UML
benefits :
sharing the costs of sports activities
private medical care
sharing the costs of professional training & courses
life insurance
remote work opportunities
flexible working time
corporate products and services at discounted prices