Do you want to be at the forefront of protecting our society against cyber threats?
We are looking for an Associate Identity Security Consultant to team up with the most dedicated team of cyber specialists in our Identity & Access Management domain.
About Truesec – A Leading Cybersecurity Company
Since 2005, Truesec has been a native cybersecurity company, driven by one single purpose: Creating safety and sustainability in a digital world by preventing cyber breach and minimizing impact.
Over the years, we’ve earned the trust of organizations worldwide and gained a strong reputation internationally. Our team consists of dedicated specialists covering the entire spectrum of cybersecurity – with capabilities in Predict, Prevent, Protect, Respond, and Recover.
Today, we employ around 300 employees – and as the demand for cybersecurity expertise grows we need to grow too. So, we are now looking for a new colleague who wants to enhance on their skills, with focus on SailPoint and Microsoft technology, to join our team.
So, if you want to become an expert in a growing security discipline within one of the leading technologies, alongside a dynamic, ambitious, and welcoming team of specialists, then you might be what we are looking for.
Identity Security team
Our team of experts consist of engineers, consultants, and architects, and we are here to support our customers to initiate, develop and mature their IAM programs.
As a dedicated SailPoint partner in Denmark, we daily feel responsible for more than 40.000 Identities.
The role you can own if you join the team
As an associate consultant, your primary responsibilities will be to collaborate closely with the rest of the team to support the implementation of IAM Technologies and maintain our customers’ solutions. We work with both people, processes & technologies and have a variety of challenging assignments that will develop your consultant skills, both if you seek technical challenges or prefer to be more on the business side as a business consultant.
Your Potential Background
You can come with many backgrounds but ideally you have a bachelor’s degree in an engineering or IT discipline, or have experience working with business strategy and project management within Information Technology. With strong analytical skills and technical understanding, you can learn and master new technologies fast.
What do we want to see from you?
- You are highly motivated to enter a steep learning curve both regarding people, processes, and technology.
- You can communicate clearly in English both orally and in writing.
- You have basic technical knowledge
- You have some development skills
- You know how to collaborate , communicate, and do presentations.
You will blow us away – in a positive way, if you can tick any of these boxes off:
- Previous experience within Identity & Access Management, business consulting and Strategy
- Hands-on knowledge on Entra ID Governance and/or SailPoint technologies
- Basic infrastructure and application landscape within Active Directory, Entra ID, Apache Tomcat, Databases etc.
- Coding or scripting skills (Java, PowerShell, Python, JSON, XML, REST/SOAP).
Due to the sensitivity in our assignments, we require EU citizenship preferable in either Sweden, Denmark, Finland, or Germany, with a work permit. You must also be able to obtain a security clearance.
Join Our Mission Toward a Safe Digital Future
If you truly want to make a difference and make our world a little bit safer, this is the place for you. At Truesec, you'll get to be at the forefront of fighting cybercrime instead of reading about it in the news. This is your chance to be part of an exciting journey in a leading international cybersecurity company - and learn from some of the best in their field.
If you smile after reading this and feel the urge to apply, then we are excited to get to know you!
What is Identity and Access Management?
Identity and Access Management (IAM) is essentially a framework of rules and tools that help organizations manage their users' identities and what they are allowed to access.
This discipline ensures that only the right people have access to the right information at the right time.
As most security breaches originate from stolen or misused credentials, maintaining control over access is crucial. It significantly lowers the risk and impact of such incidents and is a top priority for many organizations today.