CrawlJobs Logo

Pam / iam coordinator

nttdata.com Logo

NTT DATA

Location Icon

Location:
Poland , Katowice

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The PAM/IAM Coordinator is responsible for managing privileged access and identity management systems. This role is crucial for maintaining security protocols and ensuring compliance with access rights. Candidates should have a strong understanding of PAM and IAM principles. The position requires no prior experience, making it suitable for entry-level applicants.

Job Responsibility:

  • managing privileged access and identity management systems
  • maintaining security protocols
  • ensuring compliance with access rights

Requirements:

  • strong understanding of PAM and IAM principles
  • no prior experience required

Additional Information:

Job Posted:
March 22, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Pam / iam coordinator

Engineer, Identity and Access Management

As an Identity Engineer, you will be responsible for the design, implementation,...
Location
Location
United States
Salary
Salary:
66379.50 - 170037.60 USD / Year
stridelearning.com Logo
Stride, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Five (5+) years of experience in identity & access management, user administration, or security compliance
  • Documented experience and a solid understanding of identity lifecycle management, credential management, role-based access, and identity governance
  • Demonstrable experience with identity management & administration tools and practices
  • Prior in-depth expertise with Active Directory, Entra ID, and SailPoint Identity Security Cloud required
  • Hands-on experience with Privileged Identity Management systems required
  • In-depth understanding of leading-edge identity governance - enabling technologies & practices
  • Strong demonstrated ability to gain consensus and support across diverse functions and departments
  • Excellent communication and presentation skills (verbal and written)
  • Experienced guiding stakeholders with risk-based decision-making
  • Ability to identify, document, and communicate information security issues to business and information owners
Job Responsibility
Job Responsibility
  • Design, implement, and maintain Stride’s Identity Governance, Management, Privileged Access Management technologies and Access technologies
  • Enforce company policies and procedures related to IAM, IGA, and PAM
  • Update and maintain policies, standards, and procedures as needed
  • Work with other IT team members to ensure seamless integrations into the overall IT infrastructure
  • Develop architecture diagrams, process workflows, and technical documentation for identity governance frameworks
  • Design and implement API integrations to enhance automation and system interoperability
  • Work with DevOps and engineering teams to integrate IAM capabilities into cloud and hybrid environments
  • Troubleshoot IAM & IGA issues and develop creative solutions to solve problems
  • Implement IGA & IAM controls & support IT IAM Controls testing (SOX and non-SOX)
  • Create detailed technical documentation and architecture diagrams to support IAM and PAM initiatives
What we offer
What we offer
  • Health benefits
  • Retirement contributions
  • Paid time off
  • Eligible employees may receive a bonus
  • Fulltime
Read More
Arrow Right
New

IT Risk Analyst

IT Risk Analyst
Location
Location
Canada , Toronto
Salary
Salary:
90000.00 USD / Year
realign-llc.com Logo
Realign
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Total Experience: 8-10 years
  • Review and Assess IT Risk Findings Evaluate risk findings created by application teams, focusing on non-compliance issues (e.g., NPIDs, vulnerabilities, DLP, expired passwords)
  • Ensure findings are properly documented and milestones for remediation are tracked and addressed
  • Play a review role rather than direct remediation ensure standards are followed and findings are closed appropriately
  • Audit Coordination Work closely with internal and external auditors, project teams, and operational risk teams to provide evidence and meet audit requirements
  • Facilitate audits, including application security, data security, IAM, PAM, and compliance (e.g., GDPR, NYDF)
  • Coordinate quarterly monthly governance calls to highlight risk issues and progress
  • Project Risk Assessment Support project risk assessments, including preparing and reviewing documents such as IRP (Integrated Risk Profile), IT Risk Triage, and related artifacts
  • Collaborate with PMs, tech leads, and custodians to ensure risk documentation is complete and accurate
  • Communication Stakeholder Management ensure effective communication with application teams, auditors, and other stakeholders regarding risk findings and remediation plans
  • Fulltime
Read More
Arrow Right
New

White Hat Hacker Presales Manager

At Vodafone, we’re not just shaping the future of connectivity for our customers...
Location
Location
Türkiye , İstanbul
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Engineering, Software Engineering, Electrical Engineering, or a related field
  • Minimum 8 years of hands-on experience in a cybersecurity role, preferably within offensive security (Penetration Testing, Red Team, Ethical Hacking, Adversary Simulation)
  • Preference for candidates holding relevant industry security certifications such as: OSCP, CEH, CISSP, CISM, CCSP, or relevant vendor certifications (e.g., Palo Alto Networks, Fortinet, Check Point, etc.)
  • Deep technical knowledge and experience in at least 3 of the following core security domains: Network Security (Firewall, IPS/IDS, Zero Trust), Application Security (API Security, WAF, SAST/DAST), Data Security and DLP, Cloud Security (Azure, Huawei, AWS or GCP), Identity and Access Management (IAM, PAM), Cyber Threat Intelligence and SOC/SIEM solutions
  • Ability to understand and analyze complex enterprise IT and security architectures
  • Ability to effectively present and explain solutions, covering both technical aspects and business value (ROI, risk reduction)
  • Excellent verbal and written communication skills
  • ability to communicate effectively with both senior executives and technical experts
  • Customer focus and the ability to manage challenging negotiations
  • Very good command of English
Job Responsibility
Job Responsibility
  • Conduct in-depth discovery and analysis to thoroughly understand customers' current security posture, architectures, and business processes. Identify potential risk areas from an Offensive Security perspective (e.g., informed by penetration testing or vulnerability hunting experience)
  • Design and propose optimal, end-to-end security solutions, integrated with the company's security product and service portfolio, addressing identified customer needs and risks
  • Provide high-level and detailed technical consultation to customers throughout the sales cycle. Effectively communicate security solutions through compelling presentations, demos, and Proof of Concept (PoC) engagements to both customer executives and technical teams.Act as a techinical advisor to customer CISO/CIO teams on risk reduction strategies and security maturity improvement
  • Support the preparation of accurate and competitive proposals that meet technical requirements
  • create documentation detailing the solution architecture and technical specifications
  • Closely monitor the latest threat trends, technological advancements, and regulatory requirements in the cybersecurity market, integrating this knowledge into presales strategies.Contribute to VF Sales and Marketing strategies to ensure VF Turkey realizes its ambitions for the short-mid and long term
  • Clear understanding of customer needs, addressing the right Vodafone solutions and creating customer-specific technical solutions
  • Identify and address customers critical technical issues (escalations) and non-technical issues, and coordinate necessary support activities
  • Ensure of understanding the scenarios, features and functions within each of the products and how these are applied to address business and technical needs
  • Creating presentations and demonstrations that summarise the simple technical and business benefits of the solution
What we offer
What we offer
  • Vflexy: Flexible Benefits Program
  • Hybrid working kit
  • Ergonomic kit allowance
  • Digital meal voucher
  • Flexible transportation allowance
  • Employee assistance hotline & counselling
  • Comprehensive and flexible private health insurance
  • Discounted price deals for wide range of products & services
Read More
Arrow Right

Technical Architect - Security

The Technical Architect - Security role at NTT DATA involves designing and imple...
Location
Location
Belgium , Diegem
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor in ICT at a minimum (Master strongly preferred)
  • Relevant certifications or proven knowledge in IT security area (CISSP, CISM, CISA,…)
  • Strong and proven experience in designing, deploying, and supporting large security deployments
  • In-depth knowledge of the current security offering available on the market (Fortinet, Cisco, Palo-Alto, Checkpoint, …)
  • In-depth understanding of the use of security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments
  • Understanding of security control framework (ISO2700x, NIST, CIS,…), security directive (NIS2, DORA, GDPR,..) and risk management processes
  • At least 5 proved years’ experience in architecture and consulting functions
  • French or Dutch as mother tongue and good verbal and written knowledge of the other language as well as English
  • Emotional and stress resilience and ability to autonomously achieve challenging goals
  • Clear and persuasive communication and able to interact with various stakeholders in a consultative engagement
Job Responsibility
Job Responsibility
  • Conduct consultative engagements, as lead consultant or team member, with clients to ensure the delivery of assessment services in security architecture and governance domains
  • Ensure hand-over of engagement information and opportunities to internal stakeholders
  • Help develop standardized consultative engagement templates in response to reoccurring client needs and raise internal awareness of such engagements
  • Perform business development and presales work for opportunities within your domain
  • Act as a mentor for less experienced consultants or architects
  • Participate, together with specialized subject matter colleagues or third parties, to the creation of complex solutions focusing on security with a main focus on service , application and infrastructure components
  • Guarantee the global coherency of proposed solutions
  • Understand the client’s business strategy, policies, processes, services and roadmap and map these to information system, security frameworks and technology architectures
  • Help the client executing on his security governance roadmap by coordinating the design and implementation efforts with a pragmatic and actionable approach
  • Work together with our Transformation Consultants and the client’s CISO or security manager to deliver strategic advice for improvement
  • Fulltime
Read More
Arrow Right

Identity & Access Management (IAM) Engineer

As a member of the Information Services Department, the Identity & Access Manage...
Location
Location
United States , Pittsburg, Philadelphia, Warrington, Exton, or Blue Bell
Salary
Salary:
Not provided
benchmarkmakers.com Logo
Benchmark Makers
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security or related field required
  • Minimum of five years in an IAM role required
  • Knowledge of Authentication Frameworks (SAML, OAuth, JWT, API Tokens)
  • Experience using languages such as Powershell, Python, or other current programming and scripting languages
  • Working knowledge of Active Directory/EntraID and their sub-services (Authentication, Authorization, Conditional Access, Multifactor, etc.)
  • Strong analytical and problem-solving skills to enable effective security event and problem resolution
  • Proficiency in working with APIs using Rest/Soap/Oauth
  • IGA experience required, preferably Sailpoint
  • Knowledge of compliance standards (HIPAA, CCPA, GDPR, etc.)
  • Knowledge of RBAC/ABAC principles and their implementations
Job Responsibility
Job Responsibility
  • Design and Implement Authentication and Authorization frameworks to protect systems and information
  • Develop and Maintain Single Sign-On configurations used by the organization
  • Create and develop IAM solutions for internal requirements and client requests
  • Collaborate and coordinate with other teams to establish security protocols across the Firm
  • Develop and maintain IGA solutions to provide efficient and effective lifecycle and access management
  • Create, develop, and maintain enforcement mechanisms to ensure that Firm policies are being adhered to across the Firm
  • Administration of Active Directory and EntraID services
  • Management of Enterprise and Team level projects while achieving deadlines set by the Firm
  • Respond and resolve to tickets incoming from End Users and other IT Members
  • Responsible for the development and administration of the IGA and PAM systems
  • Fulltime
Read More
Arrow Right

Identity & Access Management (IAM) Engineer

As a member of the Information Services Department, the Identity & Access Manage...
Location
Location
United States , Raleigh
Salary
Salary:
Not provided
benchmarkmakers.com Logo
Benchmark Makers
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security or related field required
  • Minimum of five years in an IAM role required
  • Knowledge of Authentication Frameworks (SAML, OAuth, JWT, API Tokens)
  • Experience using languages such as Powershell, Python, or other current programming and scripting languages
  • Working knowledge of Active Directory/EntraID and their sub-services (Authentication, Authorization, Conditional Access, Multifactor, etc.)
  • Strong analytical and problem-solving skills
  • Proficiency in working with APIs using Rest/Soap/Oauth
  • IGA experience required, preferably Sailpoint
  • Knowledge of compliance standards (HIPAA, CCPA, GDPR, etc.)
  • Knowledge of RBAC/ABAC principles and their implementations
Job Responsibility
Job Responsibility
  • Design and Implement Authentication and Authorization frameworks to protect systems and information
  • Develop and Maintain Single Sign-On configurations used by the organization
  • Create and develop IAM solutions for internal requirements and client requests
  • Collaborate and coordinate with other teams to establish security protocols across the Firm
  • Develop and maintain IGA solutions to provide efficient and effective lifecycle and access management
  • Create, develop, and maintain enforcement mechanisms to ensure that Firm policies are being adhered to across the Firm
  • Administration of Active Directory and EntraID services
  • Management of Enterprise and Team level projects while achieving deadlines set by the Firm
  • Respond and resolve to tickets incoming from End Users and other IT Members
  • Responsible for the development and administration of the IGA and PAM systems
  • Fulltime
Read More
Arrow Right
New

Senior Identity & Access GRC Engineer

Senior Identity & Access Governance Engineer is responsible for the design, impl...
Location
Location
Romania , Bucuresti
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5–8+ years of experience in IAM or Identity Governance
  • Experience in building or transforming IAM capabilities
  • Hands-on experience with enterprise IAM platforms (SailPoint, Saviynt, OneIdentity, Okta, Microsoft Entra ID)
  • Experience with PAM solutions (CyberArk, BeyondTrust)
  • Strong knowledge of: RBAC / ABAC
  • Segregation of Functions (SoD)
  • SAML, OAuth2, OIDC
  • LDAP / Active Directory
  • MFA and conditional access policies
  • Experience in regulated environments (telecom, financial, utilities – preferred)
Job Responsibility
Job Responsibility
  • Define IAM governance framework, standards and control structure
  • Design IAM operational model
  • Translate IAM policies and standards into applicable technical controls
  • Design and maintain enterprise-wide RBAC models aligned with business roles and risk levels
  • Define and enforce Segregation of Functions (SoD) controls
  • Establish Key Risk Indicators (KRIs) and control effectiveness metrics
  • Maintain IAM documentation and record repository
  • Create an IAM maturity roadmap
  • Ensure alignment with Zero Trust principles
  • Design and optimize Joiner Mover Leaver processes
What we offer
What we offer
  • Hybrid working regime 2 days from the office, 3 days remote
  • Special discounts for Vodafone employees, Friends & Family offers
  • Demo telephone subscription - unlimited (voice and data)
  • Voucher for the purchase of a mobile phone
  • Medical subscription to a top private clinic & other medical benefits
  • Insurance for hospitalization and surgical interventions
  • Life insurance
  • Meal tickets
  • Bookster subscription
  • Participation in development programs and challenging projects in the leadership area
  • Fulltime
Read More
Arrow Right

Identity & Access Management Specialist

As the IAM Specialist, you will play a pivotal role in shaping, supporting, and ...
Location
Location
Australia , Perth
Salary
Salary:
Not provided
airswift.com Logo
Airswift Sweden
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum 5+ years of hands-on experience, specifically with Saviynt IGA
  • Proven track record in large-scale enterprise environments with thousands of identities
  • Demonstrated ability to architect secure, scalable IAM solutions within Saviynt
  • Proven ability to manage cross-cultural, geographically dispersed MSP teams, leveraging strong communication, negotiation, and conflict resolution skills to build trust, ensure accountability, and achieve shared objectives in a dynamic, global environment
  • Deep understanding of IAM principles: RBAC, ABAC, Least Privilege, Attestation
  • Strong scripting skills (Java/PowerShell/Python, SQL, JSON/REST API) for customization and connector development
  • Exceptional written and verbal communication skills, able to articulate security controls to non-technical audiences
  • Perth based with full working Australian rights
Job Responsibility
Job Responsibility
  • Engage with business partners, HR, and compliance teams to gather complex access requirements and translate them into fit-for-purpose Saviynt solutions (e.g., RBAC models, provisioning workflows, policy engines)
  • Design conceptual and logical IAM architectures within Saviynt, ensuring alignment with global security policies
  • Conduct gap analysis between current and future state access management, providing clear roadmaps for IAM maturity
  • Contribute to the design, configuration, and implementation of Saviynt solutions
  • Manage onboarding of applications, definition of access controls, and configuration of connectors within the Saviynt ecosystem
  • Troubleshoot complex integration issues between Saviynt and target systems (AD, SAP, ServiceNow, Cloud Platforms)
  • Drive the organization’s IAM maturity journey by implementing modern security principles, including Zero Trust and Least Privilege
  • Contribute to the design and enforcement of Just-in-Time (JIT) access models and enhance Privileged Access Management (PAM) controls
  • Manage certification campaigns, access reviews, and segregation of duties (SoD) policies
  • Translate complex technical IAM challenges into business risks for management, while providing detailed technical guidance to developers and support teams
What we offer
What we offer
  • Competitive contract rates
  • Flexible working arrangements
  • Exposure to a Global Energy company
Read More
Arrow Right