Information Security Engineer Privileged Access Management
Katowice, Poland
Eurofins
World leader in food, environment, pharma product testing & agroscience CRO services; 61,000 staff across a network of more than 1,000 independent companies (940 laboratories) in 59 countries, offering over 200,000 analytical methods.Company Description
Eurofins Scientific is an international life sciences company which provides a unique range of analytical testing services to clients across multiple industries. The Group believes it is the world leader in food, environment and pharmaceutical products testing and in agroscience CRO services. It is also one of the global independent market leaders in certain testing and laboratory services for genomics, discovery pharmacology, forensics, advanced material sciences and for supporting clinical studies. In addition, Eurofins is one of the key emerging players in specialty clinical diagnostic testing in Europe and the USA.
Group's key figures are approx. 4.56 billion Euros turnover, over 900 laboratories across 50 countries and about 58,000 staff.
Job Description
How can you contribute?
In this role, you will be responsible for supporting the Privileged Access Management (PAM) services while adhering to Eurofins standards and best practices for the entire environment (On-Prem and Cloud).
It is essential for you to be able to take up challenges, adapt to the business needs, and staying focused on delivering results, as well as act as a strong technical leader. Therefore, you will be expected to provide out of business support hours from time to time, and on short notice, as and when required (e.g., troubleshooting and resolving production issues, or carry out essential maintenance activities).
You will work closely with business and IT stakeholders to develop and perform stronger governance of PAM & IAM processes, engage in risk-based security assessments, and assist in remediation efforts.
Other responsibilities will include:
· Responsible for creating, maintaining, and monitoring the policies on PAM solutions
· Ability to document and define PAM target state processes and gather business requirements
· Support security-related assessments and configurations for PAM platforms and provide a recommendation of the best practices for implementation
· Develop and report risk metrics (KPIs/KRIs) as well periodic scorecards consumed by management for the PAM program
· Keep pace with emerging IAM and PAM technology, cyber threats, and industry trends around cybersecurity
· Establishes and refines procedures and other business processes to detect errors and inconsistencies in privileges
· Support detailed reporting and root cause analysis with various internal technology teams
· Build relationships and serve as a liaison between system/application owners and the internal technology team for governance and security-specific initiatives
Qualifications
Are you our kind of extraordinary?
You will have a University degree in a Computer Science or relevant field, ideally with CISSP, CCSK/CCSP or CISM Certifications and knowledge of BeyondTrust, CyberArk, Observe IT, Arcos or other PAM technologies. It is important to have relevant experience with Design, Build, and operations of PAM solutions and experience integrating PAM solutions with infrastructure and applications.
You must be fluent in the English language, both spoken and written.
Your technical skills must include:
· Experience and working knowledge of IAM/PAM Standards and common best practices including Authentication, Authorization, role-based access controls and PAM Governance and Administration
· Strong understanding of Privileged Access Management processes:
o Privileged access controls
o Role Base Access Control and/or Attribute and Policy-based Access Control
o Managed credentials and systems
o ITSM integration
o Manage Applications Credentials
o User Access Policy Management
o Break Glass procedures
· Strong Windows Active Directory, UNIX, Linux & SSH key management experience
· Strong understanding of network hardware configuration and password management options (SSH, ACS, LDAP)
· Strong understanding of Microsoft SQL Databases
· Strong understanding of authentication methods and techniques (LDAP/AD, others)
Technical skills in the following will be considered an advantage:
· Strong knowledge of SAML, Header-Based authentication, SCIM, FIDO, OAuth, Open ID connect and REST concepts
· Strong understanding of the information security domains
· Experience with different services, technologies within cloud environments like AWS, Azure, GCP
· Ability to perform a risk assessment and security threat modelling exercises with technology engineering teams
· Be excellent in coordination with cross-functional teams and vendors for evaluation/rollout of new technologies
Additional Information
What we offer:
· Very attractive, multicultural and friendly work environment in fast-growing international company (more than 55 000 employees now)
· Possibility to grow and make the next step in your professional career and self-development
· Long-term relationship and competitive salary package and bonus
· Medical and life insurance, MyBenefit system
· For this role there is a possibility of working fully remotely
* Salary range is an estimate based on our salary survey 💰
Tags: Active Directory AWS Azure CCSP CISM CISSP Cloud Computer Science Cyberark Forensics GCP Governance IAM KPIs LDAP Linux Monitoring Risk assessment SAML Security assessment SQL SSH UNIX Windows
Perks/benefits: Career development Competitive pay
More jobs like this
Explore more InfoSec/Cybersecurity career opportunities
Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.
- Open Information Security Specialist jobs
- Open Security Architect jobs
- Open Senior Cybersecurity Engineer jobs
- Open Security Operations Analyst jobs
- Open Senior SOC Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Security Operations Engineer jobs
- Open IT Security Engineer jobs
- Open Information System Security Officer (ISSO) jobs
- Open Electronic Warfare Advanced Tactical Trainer jobs
- Open Head of Information Security jobs
- Open IT Security Analyst jobs
- Open Cyber Hunt SME jobs
- Open Security Consultant jobs
- Open Senior Security Operations Engineer jobs
- Open Cyber Security Specialist jobs
- Open Staff Application Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Analyste CERT / Incident Responder senior (H/F) jobs
- Open Manager Pentest H/F jobs
- Open Lead Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Senior Information Security Engineer jobs
- Open Senior Security Analyst jobs
- Open Senior Penetration Tester jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Risk assessment-related jobs
- Open Governance-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open Kubernetes-related jobs
- Open DevOps-related jobs
- Open Vulnerability management-related jobs
- Open DevSecOps-related jobs
- Open IAM-related jobs
- Open SaaS-related jobs
- Open Java-related jobs
- Open CISM-related jobs
- Open APIs-related jobs
- Open Forensics-related jobs
- Open Analytics-related jobs
- Open CI/CD-related jobs
- Open Malware-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Terraform-related jobs
- Open IDS-related jobs
- Open OWASP-related jobs