IAM Tech
Listed on 2026-01-25
-
IT/Tech
Cybersecurity, Systems Engineer, Cloud Computing, Data Security
This position focuses on managing and enabling user and system access across a wide range of platforms, identity stores, and environments, including permissioning for UNIX and Linux-based systems. Individuals in this role operate with a high degree of autonomy and are expected to apply sound judgment when partnering with stakeholders throughout the organization.
You will collaborate closely with engineering teams, application teams, system owners, and database professionals to deliver access solutions that align with internal security requirements. A strong advisory mindset is essential, as the role involves guiding others on security controls, proper access request methods, and adherence to established policies. In addition, you will contribute to the creation and refinement of access-related procedures and identify opportunities to streamline or improve existing workflows.
CoreResponsibilities
Manage account permissions using role-based and group-based models across directory services and UNIX/Linux environments.
Create, update, and remove local and directory-based accounts and groups within Linux and UNIX systems.
Support service and system-level (non-user) accounts within UNIX/Linux platforms.
Administer elevated access using privileged access tools and sudo-based configurations.
Facilitate access to shared file systems, directories, and network-based storage resources.
Investigate and resolve access-related issues and permission conflicts.
Validate that all elevated access aligns with organizational security controls and regulatory expectations.
Minimum of four years supporting privileged access controls for UNIX/Linux systems within an Active Directory–integrated environment.
Hands-on experience with enterprise identity or privilege management platforms strongly preferred.
Familiarity with vaulting or privileged access security solutions is a plus.
Industry-recognized security credentials are advantageous.
Foundational cloud platform certifications or exposure to cloud identity concepts are beneficial.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).