Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
We are an independent global technology group delivering end-to-end technology solutions through a global delivery model.
We invest our efforts in unlocking the full potential of not only our clients, but also that of our employees by providing them with an evolving environment that encourages collaboration, creativity and a positive.
Responsibilities
What will you do ?
- Define and enhance the IAM governance framework: principles, standards, responsibilities, and processes.
- Implement IAM fundamentals: least privilege, RBAC, ABAC, SoD, accountability.
- Collaborate with business units, application owners, and IT to define roles and access needs.
- Build and maintain the Access Management File (DGH) with roles, profiles, permissions, and SoD rules.
- Define business and technical roles, harmonizing access across applications.
- Identify and remediate excessive or inconsistent privileges.
- Provide technical instructions for AD groups, profiles, rights, scripts, and configurations.
- Document IAM models, access matrices, procedures, and recertification processes.
- Propose continuous improvements, support automation, and ensure alignment with security standards (ISO 27001, CIS, NIST).
- IAM / IAG: Wallix, Azure AD, Active Directory.
- Applications: T24, DWH, financial/internal apps.
- Data Security: Varonis.
Who are you ?
- At least 3-4 years of experience in IAM/IAG or IT security operations.
- Master's degree or engineering diploma in Cybersecurity.
- Fluent in French and good knowledge of English.
- Personal follow-up during your career at CBTW.
- Catalogue with a wide variety of trainings for hard- and soft skills, private language classes, unlimited access to an E-learning platform and possibility to get certified every year .
- Opportunity to join Cybersecurity community and participate in knowledge sharing sessions, events, workshops, etc.
- Join one of our collectives (Wellness, Agile, RSE, Gaming ..) and share your interests with other positive thinkers.
- Competitive salary with a flexible mobility package (variety of choice, including: Electrical cars, electrical bikes, .)
- You will become part of a growing team of people keen on applying the latest technologies and knowledge .
Key Skills
Ranked by relevanceReady to apply?
Join CBTW and take your career to the next level!
Application takes less than 5 minutes

