Specialist Privileged Access Management job at CRDB
New
Website :
1 Day Ago
Linkedid Twitter Share on facebook
Specialist Privileged Access Management
2026-03-19T20:46:25+00:00
CRDB
https://cdn.greattanzaniajobs.com/jsjobsdata/data/employer/comp_2278/logo/CRDB%20Bank%20Plc.jpg
FULL_TIME
Tanzania Head Office
Dar es Salaam
00000
Tanzania
Finance
Computer & IT, Business Operations, Management
TZS
MONTH
2026-03-31T17:00:00+00:00
8

Job Purpose

Responsible for protecting the bank’s IT systems, servers, databases, and networks. This includes implementing and managing PAM and IAM processes to secure access, designing and maintaining computer security architecture, and developing cybersecurity solutions aligned with established security requirements.

Principle Responsibilities

  • Administer and maintain overall enterprise PAM solution architecture, including Vaults, PSM, CPM, and PVWA.
  • Manage the lifecycle of privileged accounts in the PAM solution: onboarding, offboarding, rotation, and monitoring.
  • Develop and enforce policies for privileged access, including session recording, just-in-time access, and credential rotation.
  • Enforce and review safe access policies for privileged accounts, including dual control/dual approval of workflows.
  • Monitor and audit privileged access sessions and alerts and coordinate investigations for anomalies and violations.
  • Troubleshoot technical issues with the PAM platform and its integrations.
  • Manage and secure remote access sessions for privileged users, ensuring compliance with policy.
  • Provide operational support for PAM users and services.
  • Assist in incident response and forensic investigations related to privileged accounts and access breaches.
  • Maintain and update documentation, SOPs, and operational procedures for PAM and IAM processes.
  • Administer general IAM operations: user provisioning, de-provisioning, access approvals, and workflow management.
  • Monitor and enforce segregation of duties (SoD) policies and controls.
  • Support internal and external audits, including preparation, evidence collection, and reporting for privileged and general access.
  • Recommend and implement improvements to access policies, controls, and PAM/IAM operations.
  • Participate in IAM-related projects such as SSO, MFA, and role-based access enhancements.
  • Maintain knowledge of best practices for privileged, remote, and enterprise access management.
  • Collaborate with Security Operations and IT teams on access-related incidents or policy violations and recommend improvements to access policies and controls.
  • Lead information security awareness and training programs (SAT program) to inform and motivate staff on cybersecurity matters.

Qualifications Required

Knowledge

  • Understanding Identity and Access Management (IAM) concepts, including authentication, authorization, RBAC, PAM, and UAM.
  • Hands-on experience specifically on PAM solutions, such as CyberArk/ Beyond-Trust solution infrastructure and administration.
  • Understanding networking concepts, principles, and network security standards.
  • Working knowledge of IT desktop applications, computer technologies, and operating systems (Windows/Linux).
  • Knowledge of IT security, virtualization, operating systems, and cloud services (Azure, AWS, GCP).

Skills

  • Strong problem-solving skills with the ability to respond and resolve issues efficiently.
  • Excellent interpersonal and oral communication skills.
  • Knowledge of security issues and products, enabling complex issues to be quickly diagnosed and resolved.
  • Effective time management and the ability to work independently or coordinate with teams.
  • Capability to conduct security awareness training and communicate cybersecurity concepts effectively.

Qualifications

  • At least 3 years of hands‑on experience in, Privileged Access Management (PAM) tools, Identity & Access Management (IAM), Active Directory, Azure AD, and related access security technologies.
  • Possession of a bachelor’s degree in computer systems/technology/ Cybersecurity or related academic field.
  • ICT Security professional certifications like CC, ISO 27001 LI, CISSP, CISA, CEH, etc. Will be an added advantage.
  • Administer and maintain overall enterprise PAM solution architecture, including Vaults, PSM, CPM, and PVWA.
  • Manage the lifecycle of privileged accounts in the PAM solution: onboarding, offboarding, rotation, and monitoring.
  • Develop and enforce policies for privileged access, including session recording, just-in-time access, and credential rotation.
  • Enforce and review safe access policies for privileged accounts, including dual control/dual approval of workflows.
  • Monitor and audit privileged access sessions and alerts and coordinate investigations for anomalies and violations.
  • Troubleshoot technical issues with the PAM platform and its integrations.
  • Manage and secure remote access sessions for privileged users, ensuring compliance with policy.
  • Provide operational support for PAM users and services.
  • Assist in incident response and forensic investigations related to privileged accounts and access breaches.
  • Maintain and update documentation, SOPs, and operational procedures for PAM and IAM processes.
  • Administer general IAM operations: user provisioning, de-provisioning, access approvals, and workflow management.
  • Monitor and enforce segregation of duties (SoD) policies and controls.
  • Support internal and external audits, including preparation, evidence collection, and reporting for privileged and general access.
  • Recommend and implement improvements to access policies, controls, and PAM/IAM operations.
  • Participate in IAM-related projects such as SSO, MFA, and role-based access enhancements.
  • Maintain knowledge of best practices for privileged, remote, and enterprise access management.
  • Collaborate with Security Operations and IT teams on access-related incidents or policy violations and recommend improvements to access policies and controls.
  • Lead information security awareness and training programs (SAT program) to inform and motivate staff on cybersecurity matters.
  • Strong problem-solving skills with the ability to respond and resolve issues efficiently.
  • Excellent interpersonal and oral communication skills.
  • Knowledge of security issues and products, enabling complex issues to be quickly diagnosed and resolved.
  • Effective time management and the ability to work independently or coordinate with teams.
  • Capability to conduct security awareness training and communicate cybersecurity concepts effectively.
  • At least 3 years of hands‑on experience in, Privileged Access Management (PAM) tools, Identity & Access Management (IAM), Active Directory, Azure AD, and related access security technologies.
  • Possession of a bachelor’s degree in computer systems/technology/ Cybersecurity or related academic field.
  • ICT Security professional certifications like CC, ISO 27001 LI, CISSP, CISA, CEH, etc. Will be an added advantage.
bachelor degree
36
JOB-69bc60a15fd35

Vacancy title:
Specialist Privileged Access Management

[Type: FULL_TIME, Industry: Finance, Category: Computer & IT, Business Operations, Management]

Jobs at:
CRDB

Deadline of this Job:
Tuesday, March 31 2026

Duty Station:
Tanzania Head Office | Dar es Salaam

Summary
Date Posted: Thursday, March 19 2026, Base Salary: Not Disclosed

Similar Jobs in Tanzania
Learn more about CRDB
CRDB jobs in Tanzania

JOB DETAILS:

Job Purpose

Responsible for protecting the bank’s IT systems, servers, databases, and networks. This includes implementing and managing PAM and IAM processes to secure access, designing and maintaining computer security architecture, and developing cybersecurity solutions aligned with established security requirements.

Principle Responsibilities

  • Administer and maintain overall enterprise PAM solution architecture, including Vaults, PSM, CPM, and PVWA.
  • Manage the lifecycle of privileged accounts in the PAM solution: onboarding, offboarding, rotation, and monitoring.
  • Develop and enforce policies for privileged access, including session recording, just-in-time access, and credential rotation.
  • Enforce and review safe access policies for privileged accounts, including dual control/dual approval of workflows.
  • Monitor and audit privileged access sessions and alerts and coordinate investigations for anomalies and violations.
  • Troubleshoot technical issues with the PAM platform and its integrations.
  • Manage and secure remote access sessions for privileged users, ensuring compliance with policy.
  • Provide operational support for PAM users and services.
  • Assist in incident response and forensic investigations related to privileged accounts and access breaches.
  • Maintain and update documentation, SOPs, and operational procedures for PAM and IAM processes.
  • Administer general IAM operations: user provisioning, de-provisioning, access approvals, and workflow management.
  • Monitor and enforce segregation of duties (SoD) policies and controls.
  • Support internal and external audits, including preparation, evidence collection, and reporting for privileged and general access.
  • Recommend and implement improvements to access policies, controls, and PAM/IAM operations.
  • Participate in IAM-related projects such as SSO, MFA, and role-based access enhancements.
  • Maintain knowledge of best practices for privileged, remote, and enterprise access management.
  • Collaborate with Security Operations and IT teams on access-related incidents or policy violations and recommend improvements to access policies and controls.
  • Lead information security awareness and training programs (SAT program) to inform and motivate staff on cybersecurity matters.

Qualifications Required

Knowledge

  • Understanding Identity and Access Management (IAM) concepts, including authentication, authorization, RBAC, PAM, and UAM.
  • Hands-on experience specifically on PAM solutions, such as CyberArk/ Beyond-Trust solution infrastructure and administration.
  • Understanding networking concepts, principles, and network security standards.
  • Working knowledge of IT desktop applications, computer technologies, and operating systems (Windows/Linux).
  • Knowledge of IT security, virtualization, operating systems, and cloud services (Azure, AWS, GCP).

Skills

  • Strong problem-solving skills with the ability to respond and resolve issues efficiently.
  • Excellent interpersonal and oral communication skills.
  • Knowledge of security issues and products, enabling complex issues to be quickly diagnosed and resolved.
  • Effective time management and the ability to work independently or coordinate with teams.
  • Capability to conduct security awareness training and communicate cybersecurity concepts effectively.

Qualifications

  • At least 3 years of hands‑on experience in, Privileged Access Management (PAM) tools, Identity & Access Management (IAM), Active Directory, Azure AD, and related access security technologies.
  • Possession of a bachelor’s degree in computer systems/technology/ Cybersecurity or related academic field.
  • ICT Security professional certifications like CC, ISO 27001 LI, CISSP, CISA, CEH, etc. Will be an added advantage.

Work Hours: 8

Experience in Months: 36

Level of Education: bachelor degree

Job application procedure

Interested and qualified? Click here to apply

All Jobs | QUICK ALERT SUBSCRIPTION

Job Info
Job Category: Computer/ IT jobs in Tanzania
Job Type: Full-time
Deadline of this Job: Tuesday, March 31 2026
Duty Station: Tanzania Head Office | Dar es Salaam
Posted: 19-03-2026
No of Jobs: 1
Start Publishing: 19-03-2026
Stop Publishing (Put date of 2030): 10-10-2076
Apply Now
Notification Board

Join a Focused Community on job search to uncover both advertised and non-advertised jobs that you may not be aware of. A jobs WhatsApp Group Community can ensure that you know the opportunities happening around you and a jobs Facebook Group Community provides an opportunity to discuss with employers who need to fill urgent position. Click the links to join. You can view previously sent Email Alerts here incase you missed them and Subscribe so that you never miss out.

Caution: Never Pay Money in a Recruitment Process.

Some smart scams can trick you into paying for Psychometric Tests.