PAM Security Specialist - 28-Jul-2025

Work set-up: 
Full Remote
Contract: 
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

University degree in Computer Science, Business Administration, or related field, or relevant IT certification., Minimum of 5 years of experience in requirements elicitation, analysis, and operational policy design., Extensive experience in cyber security processes, including compliance and risk evaluation., Proven expertise in Privileged Access Management technologies and implementation..

Key responsibilities:

  • Lead the design, documentation, and improvement of PAM solutions.
  • Engage with stakeholders to gather and prioritize requirements.
  • Support the delivery and operation of a Privileged Access Management project.
  • Contribute to the development of policies, procedures, and organizational standards.

LanceSoft, Inc. logo
LanceSoft, Inc. XLarge https://www.lancesoft.com
5001 - 10000 Employees
See all jobs

Job description


Job Title: PAM Security Specialist
Location: Remote
Duration: 1 Year+ 1 year possible extension
  • A University degree in Computer Science, Business Administration or related discipline, or certification in Information Technology from a recognized community college. An equivalent combination of education and experience may be considered.
  • 5 years operational experience in requirements elicitation and analysis, associated with operational policy and process design activities.
  • 5 years experience in cyber security processes including compliance, risk evaluation and exception handling.
  • 5 years experience in Privileged Access Management technologies.
  • 5 years experience in Privileged Access Management implementation.
  • 5 years experience in leadership roles, such as team lead, lead architect, or program technical lead.
  • Excellent communication skills (written and oral) in English.
Scored Requirements
  • The Proponent should provide evidence of fulfilling a similar role in one (1) large IT transformation project to support the delivery and operation of a new Privileged Access Management (PAM) solution.
For the project, the response should include as a minimum:
  • Name of client organization,
  • Name, title, and telephone number of client contact;
  • Description of the project, including beginning and end dates of the project,
  • Description of the Proponent’s role on the project. Description should include details such as (but not limited to):
  • Type of IT operating model implemented (e.g., Operational Support, DevOps, etc.);
  • Support levels / Tiers included in the model (e.g., Tier 0 to Tier 4);
  • Number of entities / IT units engaged (e.g., Network, Integration, Development, Service Desk, etc.). Provide insight into how they were engaged and what contributions each provided to the deliverables;
  • Deliverables produced in terms of, operational procedures, standards, policy and/or organizational structure required to achieve the identified business outcomes;
  • Greatest challenges faced by the Proponent on the project and how those challenges were addressed.
The Proponent should ensure that clear details are provided to avoid losing points.
  • Demonstrated experience designing, documenting, and improving Information Technology Service Management (ITSM) business processes related to the implementation of complex enterprise systems. The response should include as a minimum:
  • Types of policy and/or procedure deliverables produced, and in what format (e.g., Microsoft Word, Visio, etc.);
  • Stakeholders and/or SMEs involved in the production of the deliverables;
  • Engagement strategies used with the Stakeholders and/or SMEs.
  • Demonstrated competency in requirements elicitation, workshop facilitation, and requirements prioritization. Response should identify items such as:
  • Level of stakeholders engaged (Business Owners, SMEs, IT, VPs, etc.);
  • Approach to stakeholder engagements;
  • Types of deliverables produced from the engagements.
  • Demonstrated experience in Privileged Access Management (PAM) and Cybersecurity processes. Describe experience in administering a PAM solution end to end. Response should include description of processes related to the following:
  • Compliance policy and governance
  • Documenting processes and requirements
  • End-to-end implementation of PAM solutions
  • Onboarding new accesses into PAM
  • Auditing & Analytics in PAM
  • Establishment of PAM related KPIs and KRIs
  • Demonstrated experience in producing visual process models and architecture diagrams that clearly show the connections and inter-dependencies between various business capabilities, outcomes and system components. Details should include experience producing artifacts such as (but not limited to):
  • Business processes and workflows;
  • Service level agreements, policies and procedures;
  • Communication plans;
  • Responsibility alignment matrices (RACI).
  • Knowledge and experience of Active Directory/MS Entra ID, Identity and Access Management or Identity Administration and Governance solutions is considered to be a strong asset.

Required profile

Experience

Level of experience: Senior (5-10 years)
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Leadership
  • Governance
  • Communication

Related jobs