(Senior) IAM System Engineer
ti&m AG
Zürich
Key information
- Publication date:27 August 2024
- Workload:100%
- Contract type:Unlimited employment
- Place of work:Zürich
Job summary
Join our team to support clients in IAM project analysis and implementation. Enjoy a collaborative work environment and great benefits.
Tasks
- Assist clients in analyzing and implementing IAM projects.
- Provide expert consulting to our clients on IAM solutions.
- Build and optimize complex IAM infrastructures effectively.
Skills
- You need a degree in computer science and fluency in German and English.
- Strong knowledge of IAM architecture and integration solutions.
- Experience with role and permission concepts (RBAC & CBAC).
Is this helpful?
What to expect
- Support our customers in the analysis, design, and implementation of projects in the IAM focus area
- Professional consulting for our customers
- Building, operating, and optimizing complex IAM infrastructures
- Participation in projects both in the design phase and in the integration of new solutions in close collaboration with the manufacturer, architects, software, and project managers
What you bring
- (Technical) university degree in computer science
- German and English
- Very good knowledge and experience in the architecture and integration of IAM solutions, preferably with products Airlock-IAM from Ergon, SLS from USP, Coreone from ITSense, Azure Entra ID from MS and/or Keycloak
- Experience in drafting role and permission concepts (RBAC & CBAC)
- Additional knowledge in the following areas is desirable: > Web authentication technologies (OpenID Connect, OAuth, SAML, etc)
- Broad know-how in general IT security and federation topics
- Analytical and interdisciplinary thinking ability
- Entrepreneurial, responsible, and qualitative action, customer- and result-oriented
- High readiness for deployment and flexibility as well as willingness to learn new things
- Structured and goal-oriented approach
- Communicative, team-oriented, and conflict-capable personality with good assertiveness
> Cryptographic methods, their application areas, and weaknesses (PKI, OpenSSL, etc.
We are looking for you – become part of our team