Identity and Access Management Specialist
Design, development, and governance of IAM systems, including user provisioning, role-based access control, and workflow integration. Introduction and comprehensive lifecycle management of Privileged Access Management solutions (CyberArk EPM)....