Security Administration Analyst

Krakow

Brown Brothers Harriman

At Brown Brothers Harriman, we serve the most sophisticated individuals and institutions with expertise in Private Banking, Investment Management, and Investor Services.

View company page

At BBH we value diverse backgrounds, so if your experience looks a little different from what we've outlined and you think you can bring value to the role, we will still welcome your application!

What You Can Expect At BBH:

If you join BBH you will find a collaborative environment that enables you to step outside your role to add value wherever you can. You will have direct access to clients, information and experts across all business areas around the world. BBH will provide you with opportunities to grow your expertise, take on new challenges, and reinvent yourself—without leaving the firm. We encourage a culture of inclusion that values each employee’s unique perspective. We provide a high-quality benefits program emphasizing good health, financial security, and peace of mind. Ultimately we want you to have rewarding work with the flexibility to enjoy personal and family experiences at every career stage. Our BBH Cares program offers volunteer opportunities to give back to your community and help transform the lives of others.

Join us as a Security Administration Analyst

The Security Administration Analyst is responsible for supporting second level ISM complex access and provisioning requests, within established Service Level Agreements. The employee will administer user systems and data entitlements across multiple platforms and applications, ensuring the access requests are processed with high quality and accuracy. This position requires strong knowledge of ISM applications and supported systems to resolve technical provisioning issues.

Some of your key responsibilities include:  

Security Administration

  • Perform first level ISM user system access requests with a 95% in 48 Hours Service Level Agreement,

  • Administer user systems and data entitlements across multiple platforms and applications,

  • Ensure system access requests are processed with high quality and accuracy,

  • Participate in special projects as assigned.

Technical Support:

  • Coordinate with local security coordinators and application data owners to ensure accesses to programs and applications are processed and verified, within the most current standards and requirements,

  • Provide coverage and support for ISM hotline,

  • Resolve access related issues reported via Incidents,

  • Complete ad hoc tasks as assigned, e.g., updating Knowledge Base, training new team members.

What we offer:

  • 2 additional days added to your holiday calendar for Culture Celebration and Community Service

  • Private medical care for you and your family

  • Life Insurance

  • Hybrid Working Opportunities

  • Professional trainings and qualification support

  • Thrive Wellbeing Program

  • Online benefit platform

  • Contracts for an indefinite period of time with no probation period

Desired Qualifications:

  • A strong interest in technology and Information Security, Access/Identity Management.

  • Knowledge of Security administration technology, tools such as Active Directory, Service-now, RBAC, Least Privilege Access principles.

  • Ability to think analytically and solve problems.

  • Ability to work in a team environment.

  • ITIL certification training is a plus,

  • Information Security specialization or training is a plus,

  • Ability to handle multiple priorities, while meeting deadlines.

  • Very good command of English.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Active Directory ITIL

Perks/benefits: Career development Health care

Region: Europe
Country: Poland
Job stats:  9  0  0
Categories: Admin Jobs Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.