Identity and Access Management Specialist

Vilnius or Kaunas

|

departament logo

|

Hybrid

Main Responsibilities

  • Develop and implement IAM policies and procedures in line with industry best practices and regulatory requirements;
  • Conduct regular system access reviews to ensure compliance and security;
  • Collaborate with cross-functional teams to define and enforce access controls across diverse platforms and applications;
  • Secure access controls, authentication mechanisms, and monitoring tools across relevant company systems;
  • Own and participate in IAM-related projects, including system integrations, upgrades, and enhancements;
  • Provide guidance and support to stakeholders on access management issues, including access requests and entitlement reviews.

Core Requirements

  • Bachelor's degree in information technology, or equivalent work experience
  • Fundamental knowledge of information security governance;
  • Experience supporting security operations;
  • Familiarity with IAM policies, standards, and compliance;
  • Understanding role-based access control and user access certifications;
  • Strong problem solving with the ability to describe solutions and progress;
  • Strong communication skills.

Bonus Points For

  • Hands-on work experience in Microsoft Active Directory, AWS IAM, Privileged Identity Management solutions, and support

Salary Range

  • Gross Salary 1910 - 2650 EUR/month

Data Handling

Kindly refer to our Privacy Notice for Recruitment Candidates for comprehensive information regarding our data handling procedures throughout recruitment processes.

After you apply

Our recruitment process differs depending on specific positions and/or hiring teams. However, it tends to include the following three main stages and usually doesn’t exceed any more than five steps.

Step 1.

Get to know

The goal of the first step is to get to know each other better. So during that, we talk more about the role and ask you to share your story.

Step 2.

Technical evaluation

We test each applicant's technical knowledge and problem-solving ability through various assessments.

Step 3.

Meet the team

The final step is for you to meet the team, discuss your task, and dig deeper into the role you’re applying for. If everyone’s happy with the result, the closing step will be the offer.

We Offer

Apply now

 
 
 
 
 

Nord Security is committed to building an inclusive workplace with a diversity of backgrounds. We welcome applications from people of all ages, gender identities, sexual orientations, racial identities, ethnicities, religious beliefs, and disability statuses. To reduce the chance of unconscious bias, you may submit your CV without a photograph or other redundant information like age or marital status.

By filling in this form you agree to the processing of your personal data by Nord. Provided data is processed for recruitment purposes. You can withdraw your consent to the processing of your personal data at any time. For more information on your rights and data processing please read our Privacy Policy.

Nord Security is a world-leading cybersecurity solutions provider. We aim to shape a more trusted and peaceful online future for people everywhere. To achieve this goal, we’ve built a like-minded community of over 1000 cybersecurity and tech experts driven by Nord values. And we’re always looking to expand our team of: