Position Details
About this role
Design and implement security solutions focusing on identity and access management, database security, and vulnerability management to protect organizational assets.
Key Responsibilities
- Manage IAM systems
- Develop security architecture
- Conduct vulnerability assessments
- Analyze database security
- Implement security protocols
Technical Overview
Security engineering involving IAM, database intelligence, cloud security, vulnerability management, and security architecture across cloud and on-premise environments.
Ideal Candidate
The ideal candidate is a mid-level cybersecurity professional with expertise in identity and access management, database intelligence, and security engineering. They should have strong analytical skills and experience with security architecture and vulnerability management.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Lack of cybersecurity experience, No knowledge of IAM or security engineering, No relevant education or certifications, Inability to work in a team environment
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile