Related skills
iam pam ssh_keysπ Description
- Conduct end-to-end analysis of secrets and credential management.
- Identify, classify, and document secrets, ownership, usage, and risks.
- Assess control gaps and define remediation for secrets.
- Define requirements for centralized secrets management.
- Facilitate workshops with stakeholders for requirements and governance.
π― Requirements
- Experience in IT security analysis or security governance.
- Strong IAM, PAM, least privilege, and secure access governance.
- Knowledge of credential types (passwords, SSH keys, API keys).
- Ability to translate security risks into actionable requirements.
- Strong communication and documentation, across technical and non-technical teams.
π Benefits
- Flexible B2B contract collaboration.
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!