T-Mobile Polska S.A.

  • Build and manage IAM services in a complex environment.
  • Analyze and design robust processes involving identity management.
  • Solve technical challenges arising during the implementation.
  • Develop integration with PAM environments and with other systems.
  • Propose new areas for process optimization related to IAM solutions.
  • Evaluate current Identity and Access Management solutions and when necessary apply new systems or solutions.
  • Review security, performance and configuration of existing IAM implementations.

Cyber security is an extremely important part of our work in telecommunications, as we prioritize the protection of our customers' data. We watch the network 24/7 and monitor anomalies while protecting your Critical Infrastructure. We prevent and respond immediately to all threats. We impact the security of millions of our network users every day by providing them with the highest level of security services.

We take a strategic and global approach to security, countering hacking attacks, creating a unique environment for the emergence of new and innovative solutions and products in fraud detection, cyber threats and business process monitoring.

What does the recruitment process look like?

  1. Resume analysis
  2. Meeting with the Recruiter
  3. Meeting with the Manager
  4. Welcome to T-Mobile!

  • 5+ years of prior demonstrable hands-on experience working with one of the industry-leading IAM solutions.
  • Thorough understanding of Identity repositories such as at least two of: AD, AAD, AWS IAM, Okta.
  • Prior experience with design, architecture, installation, configuration and maintenance of IAM solutions.
  • Strong understanding of SAML and OIDC.
  • Demonstrable understanding of the Identity and Access Management security principles and technologies (ACLs, LDAP, RBAC, ABAC, MFA, SSO).
  • Good understanding of concepts like self-service, identity lifecycle, autoapproval, separation of duties, recertification.
  • Self-discipline and time management skills, ability to work with little to no supervision.
  • The capacity to comfortably converse on cyber security topics in a natural manner with both technical and non-technical audiences.
  • A thorough understanding of Linux and Windows platform security models.
  • Ability to write simple automation using one of the popular programming languages.
  • Ability to create high quality documentation including models in for example UML.

Najważniejsze są doświadczenia naszych klientów – indywidualnych, biznesowych oraz wewnętrznych w ramach T-Mobile. Sami budujemy i rozwijamy rozwiązania, pracujemy z szerokim stack'iem technologicznym, automatyzujemy, działamy tu i teraz, bo każda mikrosekunda ma znaczenie, kiedy mówimy o sieci.

CI/CD, CX, agile to nasz magentowy sposób pracy. W tym roku głównie stawiamy na: krótszy time to market, cloudyfikację, modernizację sieci, rozwój 5G, stworzenie systemu informowania o awariach, zmniejszanie liczby reklamacji i wzrost stabilności sieci. Ty też możesz być częścią naszej technologicznej transformacji!

Szukasz pracy? Sprawdź co nowego na magentateam.pl i aplikuj, aby samemu doświadczyć naszych magentowych możliwości.