PAM Security Specialist - 28-Jul-2025

Work set-up: 
Full Remote
Contract: 
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

University degree in Computer Science, Business Administration, or related discipline, or relevant IT certification., Minimum of 5 years operational experience in requirements elicitation and analysis., Extensive experience in cyber security processes, including compliance and risk evaluation., Proven expertise in Privileged Access Management technologies and implementation..

Key responsibilities:

  • Lead the delivery and operation of Privileged Access Management solutions.
  • Design, document, and improve IT service management processes related to enterprise systems.
  • Engage with stakeholders to elicit, prioritize, and document requirements.
  • Provide leadership and technical guidance in cyber security and PAM projects.

LanceSoft, Inc. logo
LanceSoft, Inc. XLarge https://www.lancesoft.com
5001 - 10000 Employees
See all jobs

Job description


Job Title: PAM Security Specialist
Location: Remote
Duration: 1 Year+ 1 year possible extension
  • A University degree in Computer Science, Business Administration or related discipline, or certification in Information Technology from a recognized community college. An equivalent combination of education and experience may be considered.
  • 5 years operational experience in requirements elicitation and analysis, associated with operational policy and process design activities.
  • 5 years experience in cyber security processes including compliance, risk evaluation and exception handling.
  • 5 years experience in Privileged Access Management technologies.
  • 5 years experience in Privileged Access Management implementation.
  • 5 years experience in leadership roles, such as team lead, lead architect, or program technical lead.
  • Excellent communication skills (written and oral) in English.
Scored Requirements
  • The Proponent should provide evidence of fulfilling a similar role in one (1) large IT transformation project to support the delivery and operation of a new Privileged Access Management (PAM) solution.
For the project, the response should include as a minimum:
  • Name of client organization,
  • Name, title, and telephone number of client contact;
  • Description of the project, including beginning and end dates of the project,
  • Description of the Proponent’s role on the project. Description should include details such as (but not limited to):
  • Type of IT operating model implemented (e.g., Operational Support, DevOps, etc.);
  • Support levels / Tiers included in the model (e.g., Tier 0 to Tier 4);
  • Number of entities / IT units engaged (e.g., Network, Integration, Development, Service Desk, etc.). Provide insight into how they were engaged and what contributions each provided to the deliverables;
  • Deliverables produced in terms of, operational procedures, standards, policy and/or organizational structure required to achieve the identified business outcomes;
  • Greatest challenges faced by the Proponent on the project and how those challenges were addressed.
The Proponent should ensure that clear details are provided to avoid losing points.
  • Demonstrated experience designing, documenting, and improving Information Technology Service Management (ITSM) business processes related to the implementation of complex enterprise systems. The response should include as a minimum:
  • Types of policy and/or procedure deliverables produced, and in what format (e.g., Microsoft Word, Visio, etc.);
  • Stakeholders and/or SMEs involved in the production of the deliverables;
  • Engagement strategies used with the Stakeholders and/or SMEs.
  • Demonstrated competency in requirements elicitation, workshop facilitation, and requirements prioritization. Response should identify items such as:
  • Level of stakeholders engaged (Business Owners, SMEs, IT, VPs, etc.);
  • Approach to stakeholder engagements;
  • Types of deliverables produced from the engagements.
  • Demonstrated experience in Privileged Access Management (PAM) and Cybersecurity processes. Describe experience in administering a PAM solution end to end. Response should include description of processes related to the following:
  • Compliance policy and governance
  • Documenting processes and requirements
  • End-to-end implementation of PAM solutions
  • Onboarding new accesses into PAM
  • Auditing & Analytics in PAM
  • Establishment of PAM related KPIs and KRIs
  • Demonstrated experience in producing visual process models and architecture diagrams that clearly show the connections and inter-dependencies between various business capabilities, outcomes and system components. Details should include experience producing artifacts such as (but not limited to):
  • Business processes and workflows;
  • Service level agreements, policies and procedures;
  • Communication plans;
  • Responsibility alignment matrices (RACI).
  • Knowledge and experience of Active Directory/MS Entra ID, Identity and Access Management or Identity Administration and Governance solutions is considered to be a strong asset.

Required profile

Experience

Level of experience: Senior (5-10 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Leadership
  • Microsoft Word
  • Communication

Related jobs