#1 Job Board for tech industry in Europe

Cyber Security Expert: PKI & PAM Area
Security

Cyber Security Expert: PKI & PAM Area

Type of work
Undetermined
Experience
Senior
Employment Type
B2B
Operating mode
Remote
T-Mobile Polska S.A.

T-Mobile Polska S.A.

Jesteśmy firmą technologiczną i tworzymy innowacyjne rozwiązania. Udostępniamy na rynku 5G, oferujemy najlepsze usługi mobilne, a dzięki wielu Data Center zapewniamy liczne usługi ICT. Oferujemy usługi z zakresu rozwiązań cloud oraz cybersecurity.

Tech stack

    ELK

    master

    Linux

    master

    Windows

    master

Job description

TECHNOLOGIES WE USE:
  • ELK
  • Linux
  • Windows

ABOUT THE PROJECT:

Joining Security Tribe will offer you the space to develop yourself professionally and personally!
You will join a team that is willing to share knowledge and is counting on you to do the same :)

WHAT WILL YOU DO?


  • Maintaintenance and development of security systems
  • Implementation and testing of security systems
  • Responsibility for several security systems
  • Integration of the above with another systems
  • Providing cybersecurity consulting
  • Testing of security controls in place and their further development
  • Mentoring of junior team members

WHAT DO YOU BRING?
  • 5+ years of prior demonstrable hands-on experience in cyber security
  • 3+ years of hands-on experience with administration of a Certificate Authority, EJBCA would be ideal
  • 2+ years hands-on experience as an administrator of a PAM solution
  • Solid know-how in digital vaults
  • Expertise in both Linux and Windows, you are proficient with the terminal
  • A thorough understanding of Linux and Windows platform security models and controls
  • You have already applied enterprise-grade PKI in devops and cloud environments
  • Basic knowledge of at least one programming language
  • Proficiency in PKI and applied cryptography in general, you know exactly how CA, RA and VA interact and know how to configure ACME
  • Know-how in authentication and authorization technologies
  • The capacity to comfortably converse on cyber security topics in a natural manner with both technical and non-technical audience
  • Comprehensive knowledge of network protocols and their security aspects
  • Strong understanding of virtualization security concepts
  • The capacity for critical thinking and ability to formulate and communicate the issues and effects that have been identified
  • Self-discipline and time management skills
  • Proven aptitude at resolving difficult technical issues

OPTIONAL:
  • Advanced ELK skills
  • AWS skills
  • Cyber Security related certificates