Responsibilities / Tasks
Within GEA the IAM and SIR members work closely together to maintain the security of GEA. With the move to cloud IAM and SIR have converged. The workers identity has become medium to infiltrate a company and it must be protected and the attack surface the credentials expose must be reduces as well as the attack surface of the device being used.
Identity and Access Management (IAM)
1. Participates in onboarding new systems into the IAM System
2. Participates in analyzing role(s) in target system(s) and determine how to map them within the IAM system
3. Assists in the automation HR triggered process within the IAM systems (Joiner, Mover, Leaver)
4. Works to ensure that the Least Privileged Access Model is followed in all solutions
Security and Incident Response (SIR)
5. Assists with managing all kind of security incidents, their reporting and follow-up
6. Assists with targeted and effective identification of root causes and elimination of error sources and security gaps
7. Prepares and improves the existing key figure analyses and supplements suitable ones for his field of activity
8. Assists in the evaluation and implementation of new state of the art security tool
Your Profile / Qualifications
9. Currently enrolled a study program with a focus on Information Security or Information Technology
10. Must be comfortable with Spoken and Written English
11. Must enjoy collaborating with others as well as deep diving into research about new technologies
12. Willingness to constantly develop and learn new things
What happens once your application is submitted?
You will receive an E-Mail when your application has been processed. One of our Talent Acquisition Specialists will review and verify that the applicant meets the qualifications criteria. Once your application has been successful verified and depending on the role you will be invited to a first interview either virtual or face to face. Usually after the second or third interview round, we will make a decision.