Cyber Threat Defense - PAM Manager
Bucharest - 1A Poligrafiei Boulevard
Nike
Inspiration und Support für alle Athlet:innen mit innovativen Produkten, Experiences und Services.Job Description & Summary
The Cyber Threat Defence team is a senior team that develops, socializes, and deploys novel mitigations to counter threat activity observed in Incident Response operations and Threat Intelligence. This role is focused on improving the overall Privileged Access Management (PAM) strategy through evaluation, testing, and collaboration, with a focus on security. Highly qualified candidates will excel in business communication and messaging in addition to technical disciplines.
Key Responsibilities:
Evaluating and enhancing existing PAM solutions, including how access is utilized, controlled, and integrated with various internal system components.
Assessing how privileged access may be compromised.
Working across multiple teams and pillars to socialize and align PAM requirements to the organization.
Working with leadership to shape the overall PAM strategy and roadmap.
Collaborating with internal teams to understand current capabilities and requirements around PAM / Identity and Access Management (IAM) solutions.
Staying current on security trends and threats and making recommendations to leadership on mitigating strategies.
Working with Active Directory (AD), PAM and IAM teams to identify risks and/or gaps and applying controls.
Minimum Years of Experience:
4 year(s) progressive professional roles involving information security and/or IT management.
Preferred Certifications and/or Training (any of the following or related certifications):
CyberArk, Microsoft, Google, and Amazon cloud certifications.
Leadership and management training.
Training time, budget, and opportunities for internal training (both as trainee and trainer) are available. Continuing to advance your career is vital to success in this role.
Possesses Core/Foundational Skills:
Possessing experience architecting, managing, and supporting Privileged Access Management solutions.
Developing and auditing the security architecture of PAM systems.
Understanding principles of information security engineering, architecture, and application security.
Possessing an understanding and practical knowledge of Active Directory, Azure, and Identity concepts.
Understanding current adversarial techniques for attacking PAM systems.
Demonstrates proven record of success in the following areas:
Acts with integrity, empathy, and diligence in the execution of a leadership role.
Has clarity of vision in developing and executing on a strategy with minimal direction required.
Utilizes effective written and verbal communication, including proper use of escalation, influence, briefings, and presentations.
Demonstrates awareness of team and organization dynamics.
Ability to influence positive outcomes.
Builds effective relationships with stakeholders and colleagues.
Demonstrates flexibility in prioritizing and completing tasks.
Acts as an escalation point for junior members.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Application security Audits Azure Cloud Cyberark IAM Incident response Strategy Threat intelligence
Perks/benefits: Career development
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs