Security Engineer - Privileged Access Management
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, IT Consultant, Systems Engineer, IT Project Manager
Company Description
About Devoteam:
Devoteam is a leading consulting firm focused on digital transformation. We help our clients leverage technology to achieve their business goals.
Our longstanding partnerships with leaders like AWS, Google Cloud, Microsoft, and Service Now amplify our capabilities, allowing us to deliver top‑tier expertise and award‑winning services. We complement these partnerships with in‑depth Cyber, Data & AI, Software development and multi cloud expertise.
For 30 years, we have always been guiding our customers on the next tech wave
. Devoteam has guided organisations through the Internet and cloud. The next revolution? AI.
11,000 tech natives working in 25+ countries, we bring you highly skilled IT experts across Europe
.
At Devoteam,
tech is in our DNA
, and it's the people we empower with tech. Now, with responsible AI, we’re ready to unlock a future where technology drives positive change.
What are we looking for?
At Devoteam, we believe cyber is about creating a more secure future for our customers. Our Cyber Security consultants leverage the technologies of trusted partners to help clients control which employees, partners, suppliers, customers and citizens have access to sensitive organisational applications and data. We also focus on the integrations of cutting‑edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion and secure information.
If you’re seeking a career in cyber security, then this opportunity might be right for you.
The position as Privileged Access Management (PAM) engineer offers a unique opportunity to gain experience to modernise the enterprise cybersecurity model by working with experienced information security professionals.
What will your day look like?As a PAM engineer, you are responsible for a number of key security platforms and processes at our clients. You will implement and support Privileged Access security controls for our clients, based on pre‑defined designs. On a regular basis, you will review the system configurations and perform troubleshooting of the platform. In this role, you will primarily work together with a multi‑disciplinary team of analysts, architects from Devoteam and the client.
You will assist in technical workshops.
You will be part of the Cyber Trust team with more than 50 people in Belgium, exchanging insights and knowledge, "ensuring a secure IT environment protecting the business goals". You will work with our customer’s business and technical employees to capture, discuss and verify cyber risks. You work on a flexible daily basis, on‑site at client’s office, at Devoteam in Zaventem or will report to your practice manager, who will be your point of contact for development and career guidance.
QualificationsWe Hire for Attitude and Train for Skills…
The person we are looking for combines the qualities of a good communicator and passion for Cyber Security. The more boxes you can tick in the list below, the closer you match the ideal profile we are looking for.
- 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as Cyber Ark, Beyond Trust, Thycotic (Delinea), Wallix or other
- Knowledge of PAM solution functionalities such as accounts management, secrets management, and software and systems patching.
- Experience with PAM Operational tasks — Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto‑upload, User Access Policy Management
- Awareness on integration with various technologies such as Service Now, VMWare and IAM solutions
- Hands‑on experience in non‑complex IT engineering systems that include basic network, storage, backup, platforms and systems patching
- Skilled in MS Windows and Linux, Active Directory concepts, including users, computers, groups, policies, and knowledge of Kerberos, LDAP, SSH and public key infrastructures
- Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM):
Logical Access Controls, LDAP…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).