Cybersecurity Engineer – Identity and Access Management (Omada)

Apply now

Active job offers

Cybersecurity Engineer – Identity and Access Management (Omada)

  • Security

Requirements

  • Strong knowledge of Omada IAM solutions.
  • Experience in managing identity and access management in large organizations.
  • Familiarity with IAM standards and compliance regulations, such as GDPR and ISO.
  • Ability to assess and mitigate risks associated with user access and permissions.
  • Strong analytical skills.
  • Effective communication and collaboration skills
  • Fluent English
  • German (nice to have)

Job description

Our customer is a German company specializing in comprehensive IT solutions, supporting enterprises in their digital transformation. With extensive experience, it offers high-quality services that include IT infrastructure management, business applications, and modern workplace (Digital Workplace) solutions. The company focuses on long-term relationships, tailoring services to meet clients’ specific needs, ensuring stability, security, and innovation. They operate throughout Germany, with its primary goal being to help clients achieve long-term success in a dynamic technological landscape. The company serves a wide range of clients, including large enterprises and organizations with complex IT needs and provides modern IT infrastructures and scalable cloud solutions, such as SAP and AI, customized to clients’ requirements. Our customer operates as a dynamic IT service provider, supporting the digital transformation of the German economy.

Main responsibilities:

  • Implement and manage Identity and Access Management (IAM) solutions using Omada technology.
  • Configure IAM policies and workflows to align with organizational security requirements.
  • Monitor and audit user access to ensure compliance with IAM policies.
  • Conduct periodic reviews of user permissions and access levels.
  • Collaborate with IT and security teams to integrate IAM with existing systems and applications.
  • Develop and maintain documentation for IAM processes and procedures.

Benefits

More reasons to work with us

add_home_work

Work from home or the office

Depending on the position, you can work remotely, from the office or in a hybrid model.

sync_saved_locally

Top-of-the-line equipment

We provide the equipment that best suits your needs and the requirements of your role.

redeem

Training budget

Use your personal training budget to gain new skills and knowledge.

diversity_2

Internal initiatives

Take part in our knowledge-sharing meetups organised by and for tech enthusiasts.

stethoscope

Private health insurance

Keep your health in check with easy access to medical professionals.

Recruitment process

It only takes a few steps

Different roles have different requirements, so the recruitment process depends on the specific position you are applying for.

quick_reference_all

Checking your CV

We read every resume we receive carefully. If you meet our requirements, we will call you to learn more about your expertise and needs.
psychology

Evaluating your qualifications

After an initial phone call, we check your skills with a task related to your position and provide you with feedback afterwards.
sms

Making an appointment

The next step is a meeting at our office or online, where you can learn more about the team and our work culture from a Spyrosoft manager and/or partner.
task_alt

Getting the answer

At Spyrosoft, we contact every person participating in the recruitment process. Upon acceptance, we will provide a list of the next steps.

Meet the recruiter

Ola Surmińska Spyrosoft

Building a new team is a puzzle, there’s no room for mistakes.

Aleksandra Surminska

Senior Recruitment Specialist

CONTACT OUR RECRUITMENT TEAM

Apply for
Cybersecurity Engineer – Identity and Access Management (Omada)

If this offer seems to be perfect for you - don't wait, send us your CV

    Please note that we accept PDF, .doc, .docx or .odt format only.

    By agreeing to one of the following statements, I confirm that I provide my data voluntarily and accept the information contained in the Communication.
    See Communication text
    At the same time, I declare that I voluntarily provide my personal data and I acknowledge that the Controller of my personal data is Spyrosoft S.A. with its registered office in Wrocław, Plac Nowy Targ 28, the recipients of my data can be companies related with the Data Controller: in particular:
    a) dominant companies within the meaning of art. 4 § 1 point 4 of the Commercial Companies Code of 15 September 2000,
    b) affiliated companies within the meaning of art. provisions of the Commercial Companies Code of 15 September 2000,
    c) companies associated personally with the Administrator, i.e. those in which persons discharging functions in the Administrator's bodies hold at least 20% of votes or shares,
    as well as the Customers of these companies or the entities providing services in favour of the Data Controller who may act as data controllers and processors and my personal data shall be processed pursuant to the Regulation of the European Parliament and of the Council (EU) 2016/679 of 27 April 2016 on the protection of individuals with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC, pursuant to Art. 6 (1) (a) of this Regulation, during the period not exceeding 6 months

    At the same time, I acknowledge that I have the right to access and rectify my personal data, its erasure, limitation of processing, the right to object to the processing of data, the right to transfer data, the right to withdraw the consent at any time (without impact on the lawfulness of the processing carried out before the withdrawal), as well as the right to lodge a complaint to a supervisory body. Withdrawal of the consent and willingness to exercise other rights can be reported via e-mail: rodo@spyro-soft.com or by post to the following address: Spyrosoft S.A., Plac Nowy Targ 28, 50-141 Wrocław.

    I acknowledge that personal data is not subject to the automated decision making, including profiling.