CrawlJobs Logo

Senior Identity & Access GRC Engineer

vodafone.com Logo

Vodafone

Location Icon

Location:
Romania , Bucuresti

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Senior Identity & Access Governance Engineer is responsible for the design, implementation and continuous improvement of Identity and Access Management (IAM) controls across the organization to mitigate cyber risk and ensure compliance with local/international regulatory requirements. The role sits within the GRC function and acts as the technical authority for identity governance, ensuring the translation of policies into enforceable and auditable technical controls across on-premises, cloud and hybrid environments. This is a senior, hands-on role with governance responsibilities and cross-functional influence, who will design the operating model, define governance frameworks, implement risk-based controls and set the IAM maturity level at the enterprise level.

Job Responsibility:

  • Define IAM governance framework, standards and control structure
  • Design IAM operational model
  • Translate IAM policies and standards into applicable technical controls
  • Design and maintain enterprise-wide RBAC models aligned with business roles and risk levels
  • Define and enforce Segregation of Functions (SoD) controls
  • Establish Key Risk Indicators (KRIs) and control effectiveness metrics
  • Maintain IAM documentation and record repository
  • Create an IAM maturity roadmap
  • Ensure alignment with Zero Trust principles
  • Design and optimize Joiner Mover Leaver processes
  • Ensure automatic provisioning and revocation of access in critical systems
  • Reduce accounts orphaned, inactive, and overprivileged
  • Integrate IAM with authoritative sources (HR and identity sources)
  • Define SLAs for deprovisioning and monitor compliance
  • Establish access recertification governance
  • Define governance framework for Privileged Access Management (PAM)
  • Reduce permanent administrative privileges
  • Implement Just in Time (JIT) and least privilege / Just Enough Access (JEA) principles
  • Ensure privileged session monitoring and logging controls
  • Coordinate with CSOC for identity-based detection cases
  • Ensure MFA enforcement for critical systems and high-risk users
  • Validate SSO and federation configurations
  • Define authentication assurance levels based on risk
  • Align identity controls with Zero Trust principles
  • Ensure alignment IAM with: NIS2
  • ISO 27001
  • GDPR
  • Internal Security Policies
  • Support for internal and external audits
  • Provide IAM records and remediation plans
  • Track and remediate IAM non-conformities
  • Assess the health of IAM/IdM platforms and lifecycle risks (EOL/EOS)
  • Identify coverage gaps in applications and cloud environments
  • Propose a modernization and improvement roadmap
  • Lead the integration of new systems in the IAM area
  • Close collaboration with: IT Operations
  • Network Operations
  • HR
  • Application Owners
  • Cloud & DevOps Teams
  • CSOC
  • Business teams
  • Act as SME in the identity area during security incidents
  • Ensure the inclusion of identity risks in the enterprise risk register

Requirements:

  • 5–8+ years of experience in IAM or Identity Governance
  • Experience in building or transforming IAM capabilities
  • Hands-on experience with enterprise IAM platforms (SailPoint, Saviynt, OneIdentity, Okta, Microsoft Entra ID)
  • Experience with PAM solutions (CyberArk, BeyondTrust)
  • Strong knowledge of: RBAC / ABAC
  • Segregation of Functions (SoD)
  • SAML, OAuth2, OIDC
  • LDAP / Active Directory
  • MFA and conditional access policies
  • Experience in regulated environments (telecom, financial, utilities – preferred)
  • Experience in supporting audit and compliance programs
  • Enterprise IAM architecture and design
  • JML frameworks
  • Governance models for privileged access
  • Authentication and federation architecture (SSO, MFA, conditional access)
  • IAM integration in cloud and hybrid environments
  • Risk assessment and identity controls
  • Logging, monitoring and traceability requirements for identity systems
  • Ability to assess and improve the health of IAM platforms
  • Risk-based thinking
  • Ability to translate regulatory requirements into technical controls
  • Structured documentation and records management
  • Strong communication skills
  • Proactivity and ownership orientation
  • Ability to identify control deficiencies and propose solutions
  • Strategic thinking and long-term planning
  • Project management
  • Teamwork and accurate reporting
  • Problem-solving, negotiation, deadline orientation

Nice to have:

  • CISSP
  • CISA
  • CISM
  • CIAM / Certified Identity and Access Manager
  • Microsoft Certified: Identity and Access Administrator Associate
  • CyberArk Defender / Sentry
  • ISO 27001 Lead Implementer / Lead Auditor
What we offer:
  • Hybrid working regime 2 days from the office, 3 days remote
  • Special discounts for Vodafone employees, Friends & Family offers
  • Demo telephone subscription - unlimited (voice and data)
  • Voucher for the purchase of a mobile phone
  • Medical subscription to a top private clinic & other medical benefits
  • Insurance for hospitalization and surgical interventions
  • Life insurance
  • Meal tickets
  • Bookster subscription
  • Participation in development programs and challenging projects in the leadership area
  • Access to internal Wellbeing & Recognition events
  • Extra vacation days (for seniority, special events, volunteering)
  • You will benefit from specializations in your field of activity, through programs based on modern training methods and systems

Additional Information:

Job Posted:
March 21, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Identity & Access GRC Engineer

Senior Information Security Engineer

Serve as a technical leader in our Security team reporting to our Information Se...
Location
Location
United States , Boston
Salary
Salary:
150000.00 - 190000.00 USD / Year
whoop.com Logo
Whoop
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in Computer Science, Information Security, or a related technical field and/or advanced certifications (CISSP, CISM, AWS Security Specialty, SANS, etc.)
  • 8+ years of hands-on experience in Information Security, IT Security, or a related role, including at least 2 years in a senior or lead capacity
  • Proven track record implementing and managing advanced security technologies (e.g., CASB, CNAPP, CSPM, SIEM, SOAR, DLP, SWG)
  • Experience securing AI/ML systems or APIs, including governance of third-party AI integrations and organizational use of AI tools
  • Strong understanding of modern cloud security architecture (AWS, Azure, GCP) and experience performing threat modeling and risk assessments on cloud-based systems
  • Hands-on experience with application security tooling (SAST, SCA, DAST) and embedding secure development practices
  • Demonstrated leadership in security incident response, investigations, and root cause analysis
  • Effective communicator with the ability to influence stakeholders and explain security concepts to technical and non-technical audiences
  • Strong project management skills and the ability to drive initiatives to completion in a fast-paced environment
  • Experience mentoring engineers and setting operational standards
Job Responsibility
Job Responsibility
  • Implement and enhance security controls by leading the deployment, integration, and tuning of solutions such as CNAPP, SIEM, CASB, EDR, DLP, and MDM to maximize effectiveness
  • Support security design decisions by providing subject matter expertise on cloud and SaaS security best practices while influencing architecture led by the Security Architect role
  • Lead incident response and investigations by guiding containment, remediation, root cause analysis, and post-incident improvements
  • Strengthen application security by overseeing secure development practices and managing SAST, SCA, and DAST tooling
  • Advance identity and access management by supporting IAM policy enforcement, SSO, MFA, SCIM, RBAC, and user lifecycle governance
  • Secure AI systems and integrations by assessing and protecting embedded APIs and organizational AI tool usage to ensure resilience, privacy, and compliance
  • Collaborate cross-functionally by working with Engineering, IT, and GRC teams to embed security into systems and workflows
  • Mentor and influence by providing technical guidance, reviewing work, and promoting security-first thinking across the organization
  • Stay ahead of threats and regulations by tracking emerging risks, technologies, and compliance requirements to inform forward-looking strategies
  • Participate in and help improve the on-call rotation by providing guidance, escalation support, and driving improvements in response processes
What we offer
What we offer
  • competitive base salaries
  • meaningful equity
  • generous equity package
  • Fulltime
Read More
Arrow Right
New

Lead Security Architect

We are looking for a Lead Security Architect to define and evolve the company’s ...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
instadeep.com Logo
InstaDeep
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in enterprise and cloud security architecture
  • 5+ years in identity, access, and network trust design
  • 3+ years facilitating threat modeling and secure design reviews
  • Strong experience defining architecture standards and translating principles into practical patterns
  • Experience working across enterprise IT, cloud platforms, infrastructure, and product environments
  • Experience engaging with senior stakeholders across technical and non-technical functions
  • Security architecture at enterprise and cloud scale
  • Zero Trust and IAM architecture
  • Secure integration and trust-boundary design
  • Threat modeling and architecture review governance
Job Responsibility
Job Responsibility
  • Security architecture leadership
  • Define architecture principles and implementation patterns for Zero Trust, identity, authorization, trust boundaries, segmentation, secure integration, and secure access
  • Set the strategic direction for enterprise, cloud, and data security architecture
  • Define target-state architecture for Enterprise IT, Cloud, and Infrastructure, including IAM and identity trust models, reverse proxy and secure access architecture, network and data segmentation, cloud-native control patterns
  • Lead the development of architecture standards for secure integration between IT and product environments
  • Partner closely with Global IT Security Engineering on IAM, endpoint, VPN, reverse proxy, and access-tool integration
  • Define security architecture for AI/ML workflows, cloud-native data platforms, and ML pipelines
  • Establish and maintain AI/ML trust-boundary models
  • Support architecture and product teams on secure AI adoption
  • Shape standards for data governance and access design, ML pipeline trust boundaries, model and data protection patterns, secure use of AI assistants and AI-enabled workflows
  • Fulltime
Read More
Arrow Right

Chief Information Security Officer

Location
Location
Egypt , New Cairo
Salary
Salary:
Not provided
ethicshr.com Logo
Ethics HR
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s/Master’s degree in Information Security, Computer Science, Engineering, or related field from a reputable university
  • 12-15+ years of progressive experience in information security, cybersecurity, or technology risk roles, preferably in banking or financial services
  • Strong knowledge of Central Bank of Egypt cybersecurity frameworks, digital banking guidelines, and financial-sector regulations
  • Deep understanding of security technology, network security, IAM, application security, and SOC operations
  • Experience overseeing incident response, security architecture, and enterprise-wide risk management
  • Professional certifications preferred (CISSP, CISM, CRISC, CCSP or equivalent)
  • Strong knowledge of international standards like ISO 27001/27002 and global best practices for financial data protection
  • Strong leadership, communication, and stakeholder management skills with the ability to influence senior executives and steer enterprise-level decisions
Job Responsibility
Job Responsibility
  • Define and execute the bank’s enterprise information security strategy in alignment with the business and regulatory requirements
  • Establish security governance frameworks, policies, and standards across all technology and business functions
  • Oversee cybersecurity programs including threat detection, incident response, vulnerability management, and security operations
  • Lead enterprise-wide technology risk management, ensuring effective identification, assessment, and mitigation of risks
  • Ensure full compliance with Central Bank of Egypt cybersecurity mandates, digital banking requirements, and data protection regulations
  • Develop and manage the Cloud Security Architecture (e.g., AWS, Azure) strategy, ensuring secure configuration and compliance for all digital infrastructure
  • Establish Security Metrics and Key Risk Indicators (KRIs) for regular reporting to the Board and Executive Committee, demonstrating the effectiveness of the security program
  • Implement and govern API Security standards and best practices to protect data exchange within the digital ecosystem and external partners
  • Formally manage and sign off on outsourcing security agreements (third-party risk) to meet specific CBE requirements for external service providers
  • Coordinate internal and external audits, penetration tests, and security assessments
Read More
Arrow Right
New

Senior Cybersecurity Advisor

Our Oil and Gas client is seeking a security professional for the role of Senior...
Location
Location
Canada , Calgary
Salary
Salary:
Not provided
https://www.randstad.com Logo
Randstad
Expiration Date
June 21, 2026
Flip Icon
Requirements
Requirements
  • 5 or more (5+) years of related work experience working in the Cybersecurity, (IT) Information Technology and/or OT (Operational Technology) domains
  • Familiarity with one or more of the following Security Architecture standards: NIST CSF, NIST 800-53, CSA Z246.1, TSA Security Directives CIS CSC, ISA/IEC 62443
  • Familiarity with Identity and Access Management for SAP S/4HANA
  • Knowledge of, or hands-on experience with security technologies of the following functions: NGFW, VPN, IPS/IDS, vulnerability management, access management, SIEM, endpoint security, threat intelligence, governance, risk and compliance (GRC), offensive security, penetration testing, red & purple teaming
  • Strong interpersonal skills, professional demeanor and demonstrated ability to work cross functionally with stakeholders at multiple levels
  • Strong analytical, investigative, problem-solving and communications skills are important for success in this role
  • Energetic individual who is passionate and outcome focused with the ability to learn and adapt quickly to changing environments and priorities
  • Bachelor’s degree in Computer Science, Information Security, Engineering, or a technical certification in a related discipline is a requirement
Job Responsibility
Job Responsibility
  • Provide technical and non-technical leadership and security consulting to operational and project teams facilitating strategic business outcomes with safe and secure solutions
  • Leverage the client's Control Barrier Architecture and Cybersecurity standards to work with cross functional teams throughout the organization to evaluate, monitor and manage the health of controls and barriers
  • Research and maintain a knowledge base of current technology advancements, trends, and directions to influence future security capabilities
  • Build relationships throughout the organization as a trusted partner for delivering business outcomes
  • Analyze high level risk and controls to ensure cost effective and efficient placement of barriers and their efficacy to manage cyber risk throughout the enterprise
  • Advise on requirements for and implementation of cybersecurity solutions
  • Understand the placement, features and functionality of technology and processes that comprise the clients security architecture and the threats and risks they mitigate
  • Support the high-level strategy and direction of cybersecurity governance, risk, and compliance (GRC)
Read More
Arrow Right

Senior IAM Analyst

We are seeking a Senior Technical IAM Analyst (L5) who operates with strong inde...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
deliveroo.co.uk Logo
DELIVER
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High Ownership: Drives initiatives independently with minimal oversight
  • Risk-Oriented Thinking: Understands control design principles, not just process execution
  • Structured Problem Solver: Breaks complex systems into logical components and identifies root causes
  • Audit-Ready Mindset: Designs processes with evidence, traceability, and defensibility in mind
  • Influential Communicator: Engages engineering and business stakeholders confidently and credibly
  • Continuous Improver: Seeks efficiency, automation, and simplification at scale
  • Strong hands-on experience in IAM governance and administration in a complex environment
  • Deep understanding of: Joiners / Movers / Leavers lifecycle controls
  • User Access Reviews and certification models
  • Segregation of Duties (SoD)
Job Responsibility
Job Responsibility
  • Own and continuously improve Joiners/Movers/Leavers (JML) processes, ensuring completeness, accuracy, and timeliness of provisioning and deprovisioning
  • Lead and enhance User Access Reviews (UARs), ensuring SOX compliance, audit defensibility, and measurable control effectiveness
  • Identify control weaknesses, segregation of duties (SoD) conflicts, and systemic risk patterns - and implement corrective improvements
  • Act as a control owner or delegate for key IAM SOX controls, partnering with Internal Audit and GRC
  • Drive measurable reduction in manual intervention, control exceptions, and audit findings
  • Design and implement IAM configurations across tools such as Okta, Azure AD, SailPoint, Conductor1, AWS IAM, or equivalent
  • Analyse and remediate complex access structures, including nested groups, 1-to-many mappings, and over-provisioned access
  • Interpret and influence infrastructure-as-code (Terraform, YAML, JSON) and workflow automations affecting identity governance
  • Collaborate with engineering teams to embed IAM controls into application architecture and CI/CD pipelines
  • Use data analytics to validate access models, detect anomalies, and assess risk exposure
What we offer
What we offer
  • A competitive and comprehensive compensation and benefits package
  • Compensation
  • Equity
  • Food
  • Time away
  • Wellness
  • Work Life
  • Up to 5% matched pension contributions
  • Some roles may be eligible for share awards
  • Free Deliveroo Plus: free delivery and access to special offers
  • Fulltime
Read More
Arrow Right

Senior Technical IAM Analyst

We are seeking a Senior Technical IAM Analyst (L5) who operates with strong inde...
Location
Location
United Kingdom , London
Salary
Salary:
Not provided
deliveroo.co.uk Logo
DELIVER
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • High Ownership: Drives initiatives independently with minimal oversight
  • Risk-Oriented Thinking: Understands control design principles, not just process execution
  • Structured Problem Solver: Breaks complex systems into logical components and identifies root causes
  • Audit-Ready Mindset: Designs processes with evidence, traceability, and defensibility in mind
  • Influential Communicator: Engages engineering and business stakeholders confidently and credibly
  • Continuous Improver: Seeks efficiency, automation, and simplification at scale
  • Strong hands-on experience in IAM governance and administration in a complex environment
  • Deep understanding of: Joiners / Movers / Leavers lifecycle controls
  • User Access Reviews and certification models
  • Segregation of Duties (SoD)
Job Responsibility
Job Responsibility
  • IAM Governance & Control Ownership: Own and continuously improve Joiners/Movers/Leavers (JML) processes, ensuring completeness, accuracy, and timeliness of provisioning and deprovisioning
  • Lead and enhance User Access Reviews (UARs), ensuring SOX compliance, audit defensibility, and measurable control effectiveness
  • Identify control weaknesses, segregation of duties (SoD) conflicts, and systemic risk patterns - and implement corrective improvements
  • Act as a control owner or delegate for key IAM SOX controls, partnering with Internal Audit and GRC
  • Drive measurable reduction in manual intervention, control exceptions, and audit findings
  • Advanced Technical Execution: Design and implement IAM configurations across tools such as Okta, Azure AD, SailPoint, Conductor1, AWS IAM, or equivalent
  • Analyse and remediate complex access structures, including nested groups, 1-to-many mappings, and over-provisioned access
  • Interpret and influence infrastructure-as-code (Terraform, YAML, JSON) and workflow automations affecting identity governance
  • Collaborate with engineering teams to embed IAM controls into application architecture and CI/CD pipelines
  • Use data analytics to validate access models, detect anomalies, and assess risk exposure
What we offer
What we offer
  • Benefits differ by country, but we offer many benefits in areas including healthcare, well-being, parental leave, pensions, and generous annual leave allowances, including time off to support a charitable cause of your choice
  • A competitive and comprehensive compensation and benefits package
  • Up to 5% matched pension contributions
  • Some roles may be eligible for share awards
  • Free Deliveroo Plus: free delivery and access to special offers
  • Team lunches from the best local restaurants
  • 25 days annual leave plus bank holidays, increasing with length of time spent working at Deliveroo
  • One day of paid leave per year to volunteer with a registered charity
  • Funded single cover healthcare on our core plan, with the option to add family members at own cost
  • On-site gym (HQ), discounted external gym membership
  • Fulltime
Read More
Arrow Right
New

Pharmacy Technician

We’re building a world of health around every individual — shaping a more connec...
Location
Location
United States , Drexel Hill
Salary
Salary:
Not provided
https://www.cvshealth.com/ Logo
CVS Health
Expiration Date
June 22, 2026
Flip Icon
Requirements
Requirements
  • Must comply with any state board of pharmacy requirements or laws governing the practice of pharmacy, which includes but is not limited to, age, education, and licensure/certification
  • If the state board of pharmacy does not address or mandate a minimum age requirement, must be at least 16 years of age
  • If the state board of pharmacy does not address or mandate a minimum educational requirement, must have a high school diploma or equivalent, or be actively enrolled in high school or high school equivalency program
  • State-level licensure and national certification requirements vary by state, click here to learn more
  • Regular and predictable attendance, including nights and weekends
  • Ability to complete required training within designated timeframe
  • Attention and Focus
  • Customer Service and Team Orientation
  • Communication Skills
  • Mathematical Reasoning
Job Responsibility
Job Responsibility
  • Living our purpose by following all company SOPs at each workstation to help our Pharmacists manage and improve patient health
  • Following pharmacy workflow procedures at each pharmacy workstation (i.e., production, pick-up, drive-thru, and drop-off) for safe and accurate prescription fulfillment
  • Contributing to positive patient experiences by showing empathy and genuine care
  • Completing basic inventory activities, as permitted by law, and as directed by the pharmacy leadership team
  • Contributing to a high-performing team, embracing a growth mindset, and being receptive to feedback
  • Remaining flexible for both scheduling and business needs, while contributing to a safe, inclusive, and engaging team dynamic
  • Understanding and complying with all relevant federal, state, and local laws, regulations, professional standards, and ethical principles
  • Delivering additional patient health care services (e.g., immunizations, point-of-care testing, and voluntarily staffing offsite clinics), where allowable by law and supported by required training and certification
  • Where permissible, the Pharmacy Technician may also support immunizations, which includes the following responsibilities: Completing additional licensure and training requirements, in compliance with state Board of Pharmacy regulations, to obtain Technician Immunizer status to support preparing and administering vaccines
  • Educating patients about the importance of vaccines and referring patients to the Pharmacist-on-duty for vaccination questions
What we offer
What we offer
  • medical, dental, and vision coverage
  • paid time off
  • retirement savings options
  • wellness programs
  • and other resources, based on eligibility
  • Fulltime
Read More
Arrow Right
New

Mri Technologist

MedPro Healthcare Staffing, a Joint Commission-certified staffing agency, is see...
Location
Location
United States , Springfield
Salary
Salary:
Not provided
medprostaffing.com Logo
MedPro Healthcare Staffing
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Completion of a two year approved School of Radiologic Technology
  • Valid state radiology registration as required by state law
  • Registry by the American Registry of Radiologic Technology.
Job Responsibility
Job Responsibility
  • MRI technologists utilize their knowledge of anatomy, physiology and the principles of MRI to safely and efficiently operate MRI scanners, assisting in the diagnosis of disease and injury.
  • Ensure the safety of patients, staff and visitors who come in contact with the powerful magnetic field of a MRI scanner.
  • Position patients and coils on a table that slides inside the MRI scanner.
  • Inject contrast media as required.
  • Set appropriate technical parameters, operate MRI scanners and related equipment, and observe image data on computer monitors during scans.
  • Be familiar with the differences from a normal image and an abnormal image.
  • Recognize and respond to life threatening situations.
  • Assure compliance with federal, state, and local technical and professional regulations and accepted practiced guidelines.
  • Delivers quality, cost effective patient care in a professional manner.
  • Works effectively to maintain an environment of excellence, which is patient focused, providing timely, compassionate, quality patient care.
What we offer
What we offer
  • Weekly pay and direct deposit
  • Full coverage of all credentialing fees
  • Private housing or housing allowance
  • Group Health insurance for you and your family
  • Company-paid life and disability insurance
  • Travel reimbursement
  • 401(k) matching
  • Unlimited Referral Bonuses up to $1,000
  • Fulltime
Read More
Arrow Right