Cyber Security-IAM Specialist (ID:2389)
- Employer
- Stafide
- Location
- Eindhoven, Netherlands
- Salary
- Competitive
- Closing date
- 4 Dec 2024
View more categoriesView less categories
- Sector
- Engineering, IT, Security
- Job Role
- Cyber Security Consultant
- Job Type
- Permanent
You need to sign in or create an account to save a job.
Job Description
As a Cyber Security-IAM Specialist, you will:
What You Bring to the Table:
You should possess the ability to:
What We Bring to the Table:
As a Cyber Security-IAM Specialist, you will:
- Install, configure, and maintain LDAP services (RHDS and eDirectory).
- Monitor and troubleshoot operational issues on LDAP servers.
- Ensure backup, restore, and disaster recovery of LDAP databases.
- Administer RHEL8 and RHEL9 servers, managing patching and system updates.
- Optimize server performance and ensure high availability for LDAP services.
- Develop automation scripts using tools like Bash, Python, or Ansible for task automation and monitoring.
- Set up and configure systems to monitor server health and performance.
- Generate operational reports on performance, uptime, and issues.
- Maintain clear documentation for configuration, incident management, and best practices for LDAP and RHEL systems.
- Implement and follow best practices for managing LDAP and RHEL environments, ensuring security compliance.
What You Bring to the Table:
- 10+ years of experience in LDAP administration and Red Hat Linux environments.
- Proven expertise in managing RHDS and eDirectory, including replication, schema management, and performance tuning.
- Advanced knowledge of Red Hat Linux (RHEL), with experience in patch management and security hardening.
- Strong automation skills with proficiency in scripting languages (Bash, Python) and tools like Ansible.
- Hands-on experience with monitoring tools, CI/CD pipelines, and DevOps practices.
- Experience securing LDAP environments and implementing compliance policies.
- Strong troubleshooting abilities to quickly resolve LDAP and RHEL system issues.
- Familiarity with Docker, Git, Jenkins, Terraform, Postman, and other related technologies.
You should possess the ability to:
- Validate and implement functional and non-functional requirements based on business and IT principles.
- Provide effort estimates for the implementation of solutions during sprint planning.
- Design, develop, and configure new functionality in line with IAM architectural principles and strategies.
- Participate actively in Agile/Scrum events, driving standardization, automation, and innovation.
- Coordinate and validate the realization of designed functionalities according to specifications.
- Communicate effectively with stakeholders, sharing knowledge and expertise across teams.
- Identify and implement improvements in testing, development processes, and used technologies.
What We Bring to the Table:
- A collaborative and Agile work environment where innovation is encouraged.
- Opportunities for professional growth and development in cybersecurity and IAM.
- Exposure to cutting-edge technologies in automation, DevOps, and cloud solutions.
- A supportive team that shares knowledge and expertise to solve complex problems.
- The ability to work in a security-focused environment, implementing best practices for compliance and protection.
Get job alerts
Create a job alert and receive personalised job recommendations straight to your inbox.
Create alert