CrawlJobs Logo

Pam / iam coordinator

nttdata.com Logo

NTT DATA

Location Icon

Location:
Poland , Katowice

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The PAM/IAM Coordinator is responsible for managing privileged access and identity management systems. This role is crucial for maintaining security protocols and ensuring compliance with access rights. Candidates should have a strong understanding of PAM and IAM principles. The position requires no prior experience, making it suitable for entry-level applicants.

Job Responsibility:

  • managing privileged access and identity management systems
  • maintaining security protocols
  • ensuring compliance with access rights

Requirements:

  • strong understanding of PAM and IAM principles
  • no prior experience required

Additional Information:

Job Posted:
March 22, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Pam / iam coordinator

Engineer, Identity and Access Management

As an Identity Engineer, you will be responsible for the design, implementation,...
Location
Location
United States
Salary
Salary:
66379.50 - 170037.60 USD / Year
stridelearning.com Logo
Stride, Inc.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Five (5+) years of experience in identity & access management, user administration, or security compliance
  • Documented experience and a solid understanding of identity lifecycle management, credential management, role-based access, and identity governance
  • Demonstrable experience with identity management & administration tools and practices
  • Prior in-depth expertise with Active Directory, Entra ID, and SailPoint Identity Security Cloud required
  • Hands-on experience with Privileged Identity Management systems required
  • In-depth understanding of leading-edge identity governance - enabling technologies & practices
  • Strong demonstrated ability to gain consensus and support across diverse functions and departments
  • Excellent communication and presentation skills (verbal and written)
  • Experienced guiding stakeholders with risk-based decision-making
  • Ability to identify, document, and communicate information security issues to business and information owners
Job Responsibility
Job Responsibility
  • Design, implement, and maintain Stride’s Identity Governance, Management, Privileged Access Management technologies and Access technologies
  • Enforce company policies and procedures related to IAM, IGA, and PAM
  • Update and maintain policies, standards, and procedures as needed
  • Work with other IT team members to ensure seamless integrations into the overall IT infrastructure
  • Develop architecture diagrams, process workflows, and technical documentation for identity governance frameworks
  • Design and implement API integrations to enhance automation and system interoperability
  • Work with DevOps and engineering teams to integrate IAM capabilities into cloud and hybrid environments
  • Troubleshoot IAM & IGA issues and develop creative solutions to solve problems
  • Implement IGA & IAM controls & support IT IAM Controls testing (SOX and non-SOX)
  • Create detailed technical documentation and architecture diagrams to support IAM and PAM initiatives
What we offer
What we offer
  • Health benefits
  • Retirement contributions
  • Paid time off
  • Eligible employees may receive a bonus
  • Fulltime
Read More
Arrow Right

IAM Governance

We are looking for the specialist who owns the IAM governance framework, policie...
Location
Location
Salary
Salary:
Not provided
n-ix.com Logo
N-iX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8–12+ years in Information Security, IAM, Governance or Risk roles
  • Deep understanding of IAM concepts (JML, roles, SoD, access reviews, PAM)
  • Strong experience with regulatory frameworks (ISO 27001, NIS2, internal controls)
  • Experience operating in complex, federated organizations
  • Proven audit and stakeholder management experience
  • Ability to translate IAM risks into business language
  • Upper Intermediate+ Spanish and English speaking languages
Job Responsibility
Job Responsibility
  • Own and maintain IAM policies, standards, and procedures
  • Own the IAM Target Operating Model (Process, Tooling, Organization)
  • Define IAM decision rights, RACI and escalation paths
  • Ensure alignment with regulatory and internal requirements (e.g. NIS2, ISO27001, Allianz requirements)
  • Define IAM control objectives (e.g. access reviews, SoD, privileged access)
  • Oversee design and effectiveness of IAM controls
  • Coordinate IAM audits and regulatory reviews
  • Own IAM risk register and exception management
  • Define and track IAM KPIs and maturity metrics
  • Govern IAM Business Operations and Global Platform Team
What we offer
What we offer
  • Flexible working format - remote, office-based or flexible
  • A competitive salary and good compensation package
  • Personalized career growth
  • Professional development tools (mentorship program, tech talks and trainings, centers of excellence, and more)
  • Active tech communities with regular knowledge sharing
  • Education reimbursement
  • Memorable anniversary presents
  • Corporate events and team buildings
  • Other location-specific benefits
  • Fulltime
Read More
Arrow Right

Senior Director - Global Identity & Access Management

The Senior Director of Global Identity & Access Management is accountable for su...
Location
Location
United States , Houston
Salary
Salary:
Not provided
sysco.com Logo
Sysco
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 15+ years of experience in Cybersecurity and or information risk management
  • 10+ years experience with Identity & Access Management
  • Experience establishing and maintaining budgets
  • Experience managing large, complex, global projects
  • Excellent communication skills, with an ability to tailor and engage communication across all levels of the organization
  • Background and familiarity with design and implementation of Single Sign On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) controls and platforms
Job Responsibility
Job Responsibility
  • Develop and maintain the budget which operates the team
  • Manage and maintain Sysco’s IAM program and global team including IAM operations center, vendor relationships, and the necessary technology
  • Act as the lead on all major IAM incidents
  • Ensure 24x7 operations of IAM tools and processes
  • Assist initiatives related to security awareness and buy-in through IAM and enterprise operations, facilitating staff to support security operations within enterprise and across IAM services, coordination of business apps utilized across enterprise, and functions in the design of security controls relevant to Account provisioning/deprovisioning, Single Sign On (SSO), Multi-Factor Authentication (MFA), and Privileged Access Management (PAM) platforms, and Key Management
  • Support the operation of enterprise access management services provided by IT, including Single Sign On (SSO), Multi- Factor Authentication (MFA), and Privileged Access Management (PAM) platforms
  • Provide reporting to leadership regarding the status of security relevant IAM operational metrics and strategic initiatives
  • Coordinate Enterprise IAM initiatives with Cybersecurity initiatives
  • Provide feedback on Cybersecurity controls and Standards applying to the enterprise environment, in coordination with Security Architecture & Engineering, and the Cybersecurity Risk and Compliance Management functions
  • Oversee operation of security controls and processes within the IAM environment as designated by the CISO and in accordance with negotiated SLAs
  • Fulltime
Read More
Arrow Right

IT Risk Analyst

IT Risk Analyst
Location
Location
Canada , Toronto
Salary
Salary:
90000.00 USD / Year
realign-llc.com Logo
Realign
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Total Experience: 8-10 years
  • Review and Assess IT Risk Findings Evaluate risk findings created by application teams, focusing on non-compliance issues (e.g., NPIDs, vulnerabilities, DLP, expired passwords)
  • Ensure findings are properly documented and milestones for remediation are tracked and addressed
  • Play a review role rather than direct remediation ensure standards are followed and findings are closed appropriately
  • Audit Coordination Work closely with internal and external auditors, project teams, and operational risk teams to provide evidence and meet audit requirements
  • Facilitate audits, including application security, data security, IAM, PAM, and compliance (e.g., GDPR, NYDF)
  • Coordinate quarterly monthly governance calls to highlight risk issues and progress
  • Project Risk Assessment Support project risk assessments, including preparing and reviewing documents such as IRP (Integrated Risk Profile), IT Risk Triage, and related artifacts
  • Collaborate with PMs, tech leads, and custodians to ensure risk documentation is complete and accurate
  • Communication Stakeholder Management ensure effective communication with application teams, auditors, and other stakeholders regarding risk findings and remediation plans
  • Fulltime
Read More
Arrow Right
New

Pam Project Manager

Location
Location
Morocco , Rabat
Salary
Salary:
Not provided
cyclad.pl Logo
Cyclad Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Significant experience (5+ years) in project or program management within the cybersecurity field
  • Proven experience in security governance, ideally on Identity and Access Management (IAM) and Privileged Access Management (PAM) topics
  • Excellent knowledge of the concepts and challenges of Privileged Access Management (PAM)
  • Proficiency in security risk assessment methodologies (knowledge of MITRE ATT&CK or STRIDE frameworks is a plus)
  • Good understanding of various technical environments: Cloud (Azure, AWS, GCP), servers (Linux, Windows), databases, and CI/CD tools
  • Ability to write clear and pragmatic governance documents (policies, standards, guidelines)
  • Excellent leadership and the ability to autonomously manage complex projects
  • Strong interpersonal skills and the ability to communicate effectively with both technical and non-technical stakeholders at all levels of the organization
  • A strategic mindset, with the ability to anticipate developments and build a long-term vision
  • Fluency in both English and French (spoken and written) is essential for working in an international context
Job Responsibility
Job Responsibility
  • Leading weekly follow-up meetings and monthly steering committees
  • Preparing and presenting clear progress reports on activities, risks, and performance indicators
  • Coordinating various contributors and stakeholders (product teams, Cyber Defense, etc.)
  • Organizing and leading workshops to assess risks related to new technologies (e.g., Google Cloud, Microsoft 365, agentic AI solutions)
  • Formalizing risk assessments based on recognized frameworks (e.g., MITRE ATT&CK, STRIDE)
  • Proposing relevant security measures and controls to mitigate identified risks
  • Leading the review and update cycles for the PAM Permit Book
  • Organizing presentation sessions to promote its adoption within the Group's entities
  • Designing an effective deployment process, potentially through the X learning catalog
  • Conducting studies to identify future PAM needs and use cases
Read More
Arrow Right

White Hat Hacker Presales Manager

At Vodafone, we’re not just shaping the future of connectivity for our customers...
Location
Location
Türkiye , İstanbul
Salary
Salary:
Not provided
vodafone.com Logo
Vodafone
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Engineering, Software Engineering, Electrical Engineering, or a related field
  • Minimum 8 years of hands-on experience in a cybersecurity role, preferably within offensive security (Penetration Testing, Red Team, Ethical Hacking, Adversary Simulation)
  • Preference for candidates holding relevant industry security certifications such as: OSCP, CEH, CISSP, CISM, CCSP, or relevant vendor certifications (e.g., Palo Alto Networks, Fortinet, Check Point, etc.)
  • Deep technical knowledge and experience in at least 3 of the following core security domains: Network Security (Firewall, IPS/IDS, Zero Trust), Application Security (API Security, WAF, SAST/DAST), Data Security and DLP, Cloud Security (Azure, Huawei, AWS or GCP), Identity and Access Management (IAM, PAM), Cyber Threat Intelligence and SOC/SIEM solutions
  • Ability to understand and analyze complex enterprise IT and security architectures
  • Ability to effectively present and explain solutions, covering both technical aspects and business value (ROI, risk reduction)
  • Excellent verbal and written communication skills
  • ability to communicate effectively with both senior executives and technical experts
  • Customer focus and the ability to manage challenging negotiations
  • Very good command of English
Job Responsibility
Job Responsibility
  • Conduct in-depth discovery and analysis to thoroughly understand customers' current security posture, architectures, and business processes. Identify potential risk areas from an Offensive Security perspective (e.g., informed by penetration testing or vulnerability hunting experience)
  • Design and propose optimal, end-to-end security solutions, integrated with the company's security product and service portfolio, addressing identified customer needs and risks
  • Provide high-level and detailed technical consultation to customers throughout the sales cycle. Effectively communicate security solutions through compelling presentations, demos, and Proof of Concept (PoC) engagements to both customer executives and technical teams.Act as a techinical advisor to customer CISO/CIO teams on risk reduction strategies and security maturity improvement
  • Support the preparation of accurate and competitive proposals that meet technical requirements
  • create documentation detailing the solution architecture and technical specifications
  • Closely monitor the latest threat trends, technological advancements, and regulatory requirements in the cybersecurity market, integrating this knowledge into presales strategies.Contribute to VF Sales and Marketing strategies to ensure VF Turkey realizes its ambitions for the short-mid and long term
  • Clear understanding of customer needs, addressing the right Vodafone solutions and creating customer-specific technical solutions
  • Identify and address customers critical technical issues (escalations) and non-technical issues, and coordinate necessary support activities
  • Ensure of understanding the scenarios, features and functions within each of the products and how these are applied to address business and technical needs
  • Creating presentations and demonstrations that summarise the simple technical and business benefits of the solution
What we offer
What we offer
  • Vflexy: Flexible Benefits Program
  • Hybrid working kit
  • Ergonomic kit allowance
  • Digital meal voucher
  • Flexible transportation allowance
  • Employee assistance hotline & counselling
  • Comprehensive and flexible private health insurance
  • Discounted price deals for wide range of products & services
Read More
Arrow Right

Technical Architect - Security

The Technical Architect - Security role at NTT DATA involves designing and imple...
Location
Location
Belgium , Diegem
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor in ICT at a minimum (Master strongly preferred)
  • Relevant certifications or proven knowledge in IT security area (CISSP, CISM, CISA,…)
  • Strong and proven experience in designing, deploying, and supporting large security deployments
  • In-depth knowledge of the current security offering available on the market (Fortinet, Cisco, Palo-Alto, Checkpoint, …)
  • In-depth understanding of the use of security components (IAM, SASE, SSE, NAC, VPN, PAM, cloud security, cloud-delivered security, …) and security models (segmentation model, zero trust model,…) in hybrid and heterogeneous environments
  • Understanding of security control framework (ISO2700x, NIST, CIS,…), security directive (NIS2, DORA, GDPR,..) and risk management processes
  • At least 5 proved years’ experience in architecture and consulting functions
  • French or Dutch as mother tongue and good verbal and written knowledge of the other language as well as English
  • Emotional and stress resilience and ability to autonomously achieve challenging goals
  • Clear and persuasive communication and able to interact with various stakeholders in a consultative engagement
Job Responsibility
Job Responsibility
  • Conduct consultative engagements, as lead consultant or team member, with clients to ensure the delivery of assessment services in security architecture and governance domains
  • Ensure hand-over of engagement information and opportunities to internal stakeholders
  • Help develop standardized consultative engagement templates in response to reoccurring client needs and raise internal awareness of such engagements
  • Perform business development and presales work for opportunities within your domain
  • Act as a mentor for less experienced consultants or architects
  • Participate, together with specialized subject matter colleagues or third parties, to the creation of complex solutions focusing on security with a main focus on service , application and infrastructure components
  • Guarantee the global coherency of proposed solutions
  • Understand the client’s business strategy, policies, processes, services and roadmap and map these to information system, security frameworks and technology architectures
  • Help the client executing on his security governance roadmap by coordinating the design and implementation efforts with a pragmatic and actionable approach
  • Work together with our Transformation Consultants and the client’s CISO or security manager to deliver strategic advice for improvement
  • Fulltime
Read More
Arrow Right

Identity & Access Management (IAM) Engineer

As a member of the Information Services Department, the Identity & Access Manage...
Location
Location
United States , Pittsburg, Philadelphia, Warrington, Exton, or Blue Bell
Salary
Salary:
Not provided
benchmarkmakers.com Logo
Benchmark Makers
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in information security or related field required
  • Minimum of five years in an IAM role required
  • Knowledge of Authentication Frameworks (SAML, OAuth, JWT, API Tokens)
  • Experience using languages such as Powershell, Python, or other current programming and scripting languages
  • Working knowledge of Active Directory/EntraID and their sub-services (Authentication, Authorization, Conditional Access, Multifactor, etc.)
  • Strong analytical and problem-solving skills to enable effective security event and problem resolution
  • Proficiency in working with APIs using Rest/Soap/Oauth
  • IGA experience required, preferably Sailpoint
  • Knowledge of compliance standards (HIPAA, CCPA, GDPR, etc.)
  • Knowledge of RBAC/ABAC principles and their implementations
Job Responsibility
Job Responsibility
  • Design and Implement Authentication and Authorization frameworks to protect systems and information
  • Develop and Maintain Single Sign-On configurations used by the organization
  • Create and develop IAM solutions for internal requirements and client requests
  • Collaborate and coordinate with other teams to establish security protocols across the Firm
  • Develop and maintain IGA solutions to provide efficient and effective lifecycle and access management
  • Create, develop, and maintain enforcement mechanisms to ensure that Firm policies are being adhered to across the Firm
  • Administration of Active Directory and EntraID services
  • Management of Enterprise and Team level projects while achieving deadlines set by the Firm
  • Respond and resolve to tickets incoming from End Users and other IT Members
  • Responsible for the development and administration of the IGA and PAM systems
  • Fulltime
Read More
Arrow Right