Are you the KeyCloak Consultant we are looking for?

Tasks

  • In this position you are responsible for implementation of IAM (Identity & Access Management) products.
  • Working closely with clients and architects, you identify the client’s information and narrow down the client’s problem.
  • After analyzing the use cases, you translate them to technical requirements.
  • You will design, develop, and implement technical components, which match the client’s goals.

Profile

  • Minimum graduate or bachelor degree in Computer Sciences
  • Experience with IAM solutions, preferably Red Hat SSO or Keycloak
  • Experience with IAM standards (e.g. SAML, OAuth 2.0, OpenID Connect, RBAC, SCIM, UMA ...)
  • Experience in information security
  • Java knowledge (backend development)
  • Linux OS based experience
  • Experience with GIT
  • Ability to think out-of-the-box
  • Customer-oriented
  • Proactive, flexible and willing to learn
  • Strong communication and problem-solving skills
  • Ability to take initiative/responsibility

Experience or knowledge in any of the following is a plus:

  • DevOps
  • CI/CD
  • Ansible
  • Red Hat/CentOS
  • Bash
  • MariaDB/Galera
  • PostgreSQL
  • Prometheus / Grafana
  • Webservices, REST
  • Angular
  • Docker, Kubernetes, Openshift

Offer

Working for IS4U, you end up in a dynamic and challenging organization. This will allow you to take initiative and to grow as an IT security consultant. IS4U, as part of the Cronos Group, is an experienced IT security company. This gives you great career opportunities within a stable environment. We will provide a competitive salary, a company car, laptop and other company benefits.

Convinced?

Do you think you have what it takes to join our team?

Fill in the following form and let us know! We will get in contact as soon as possible!

We hope to welcome you to our awesome team soon!

About IS4U

IS4U is the primary Information Security competence center within the Cronos Group. We are experts in Information Security solutions and we understand the challenges our customers face: Improving security, streamlining operations and managing access risk while continuously demonstrating compliance with stringent industry and regulatory requirements.