Become part of our team!
Would you like to become part of a team that helps some of the largest companies in the country and the world change the way they operate and supports them with some of their largest and most complex transformation projects, while maintaining best practices and applying leading security solutions in the field of digital identity, IAM, IGA?
In the Identity and Access Management team, we are not afraid of challenges, and we support our clients comprehensively by, among other things, designing, building and optimizing processes and implementing the most important solutions in the area of identity and access management (whether based on local on-prem infrastructure or provided from the cloud aaS; implemented in a cascade model or based on agile methodologies). On a day-to-day basis, we cooperate with manufacturers of leading security solutions. Our team bridges the gap between specialized business and technical departments and client-side management.
Join our team, where you can make the most of your unique skills and talents by working with our experienced team of experts. Let's work together to improve the security of our clients and key industries every day. Together, let's help our clients understand and manage the permissions of their employees, subcontractors, and customers, enabling them to interact smoothly and seamlessly with the company's systems.
What will you do:
Working in our team you will take part in the implementation of interesting and out-of-the-box projects for large Polish and international clients in the field of cyber security and identity and access management. Your tasks will include:
Collecting business and functional requirements from the IGA/IAM area at our clients.
Designing and implementing an access role model and associated permissions.
Designing and building processes related to identity management from the business side (e.g. identity lifecycle management, access request, privilege audit).
Planning and implementing leading-edge and innovative solutions in the area of Identity and Access Management - both based on on-prem local infrastructure and provided from the cloud aaS.
Many other aspects of cybersecurity that we haven't heard of yet today, but which will become an everyday occurrence in the near future, among global market leaders.