Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We help our clients leverage technology to achieve their business goals. * Experience with PAM Operational tasks – Creating Safes, Defining Access Control, Policies/Platforms, User provisioning and entitlements, Managing Applications Credentials, Auto-upload, User Access Policy Management * Skilled in MS Windows and Linux , Active Directory concepts, including users, computers, groups, policies, and knowledge of Kerberos, LDAP, SSH and public key infrastructures * A culture of continuous development: at Devoteam, we provide you with the right environment to develop talent and expertise: we invest in our people, help them to grow with the warranty to always use the latest technologies.
more