At Roche you can show up as yourself, embraced for the unique qualities you bring. Our culture encourages personal expression, open dialogue, and genuine connections, where you are valued, accepted and respected for who you are, allowing you to thrive both personally and professionally. This is how we aim to prevent, stop and cure diseases and ensure everyone has access to healthcare today and for generations to come. Join Roche, where every voice matters.
We are seeking a Unix Access Management Engineer (Red Hat IDM) to serve as a trusted technical leader and independent expert within our Enterprise Privileged Access Management (PAM) team. In this role, you will drive the design, implementation, and optimization of Unix access management infrastructure while leading the analysis of moderately complex cybersecurity incidents. You will bridge deep technical expertise with business acumen to champion security excellence across Roche's global identity and access management infrastructure, protecting our information and assets from unauthorized access and cyber threats.
This position offers a unique blend of strategic influence and hands-on technical leadership within a multicultural, global team. You will work across multiple Identity and Access Management (IAM) products, managing end-to-end security analysis tasks, leading security incidents, and fostering continuous improvement in security operations and best practices.
Key Responsibilities
Unix Access Management & Infrastructure Leadership
Lead the design, integration, and automation of Unix Access Management systems using Red Hat IDM, with Centrify product knowledge a significant advantage
Provide strategic consultations with stakeholders to identify security requirements, design system integrations, and develop implementation roadmaps for enterprise initiatives
Lead large-scale migrations of virtual machines to Red Hat IDM infrastructure
Enable and strengthen Red Hat IDM infrastructure and monitoring capabilities to support high-volume VM environments across cloud and on-premises data centers globally
Security Analysis & Incident Management
Independently lead analysis of moderately complex cybersecurity incidents and technical problems, defining security scope and driving root cause analysis
Participate in and lead troubleshooting efforts as part of 2nd or 3rd level support with 24x7 on-call availability for major and critical issues
Deliver comprehensive security requirements, designs, and validation of effective controls
Apply advanced analytical reasoning to identify security patterns and threats
Stakeholder Collaboration & Advisory
Collaborate with key business partners to understand and address their security needs and concerns
Act as a trusted advisor, managing relationships with diverse security stakeholders across functional areas
Define and drive stakeholder engagement strategies for complex initiatives, facilitating workshops and resolving conflicts
Operational Excellence & Continuous Improvement
Manage day-to-day Tier 3 operational support, performance optimization, and lifecycle management of Unix access management infrastructure
Stay current with latest security tools, techniques, and best practices; recommend improvements and strategic enhancements
Coach and mentor peers and junior colleagues in this technology area
Proactively shape team processes and contribute to Communities of Practice
Technical & Process Development
Apply CI/CD methodologies to maintain and develop infrastructure
Implement ITIL, GxP, Product Management, and Agile Methodologies (Request, Incident, Change, and Problem Management)
Translate business requirements into strategic implementation plans aligned with organizational objectives
Apply tools and principles related to requirements analysis, data management, and process optimization
Additional Duties
Occasional international travel as required
Active engagement in self-development with actionable growth plans
Follow and help establish engineering standardization processes
Who You Are
Education & Experience
Bachelor's Degree in Computer Science, Engineering, or related discipline (or equivalent industry-accredited certification and prior working experience)
Robust experience working in a major global organization, preferably in a regulated industry
Demonstrated ability to independently manage end-to-end security analysis tasks and lead analysis of moderately complex cybersecurity incidents
Proven track record of effectively managing relationships with diverse cross-functional stakeholders on medium to large-sized engagements
Successful history of championing accountability through security incident lead and/or security project owner roles
Core Technical Skills
Red Hat IDM expertise (Centrify experience highly valued)
Unix Access Management and IAM engineering with strong hands-on technical background
Privileged Access Management (PAM) and Cloud IAM knowledge (AWS, Azure, GCP)
Linux access management with familiarity of SSSD or Red Hat IDM
Process automation and LDAP experience
Scripting & Infrastructure Automation: Python, PowerShell, Ansible, YAML
API & Integration: RestAPI implementation and usage
Containerization: Docker experience
DevOps & Infrastructure as Code (IaC): Toolchain support and development capability
Advanced analytical skills: Security pattern recognition, threat identification, and root cause analysis
Essential Soft Skills & Attributes
Trusted Advisor mentality: Bridge technical and business perspectives to build strong stakeholder relationships
Proactive problem-solver: Navigate ambiguous requirements and complex stakeholder environments independently
Mentor & leader: Demonstrated ability to coach colleagues and provide guidance on cybersecurity best practices
Excellent communication: Strong spoken and written English with outstanding documentation, negotiation, and facilitation skills
Cultural awareness: Proven interpersonal skills to interact effectively with individuals across multiple countries and cultures
Collaborative approach: Supportive, proactive engagement with colleagues across teams
Customer-focused: Highly responsive to product delivery and support needs
Continuous learner: Willingness to continually evolve technical and soft skills; committed to engineering excellence
Preferred Qualifications
Experience with DevOps toolchains and Infrastructure as Code development
Knowledge of GxP and Product Management methodologies
Active participation in Communities of Practice and process improvement initiatives
Track record of identifying and implementing organizational process improvements
Ready to make an impact on enterprise security? If you are a skilled Unix Access Management engineer with Red Hat IDM expertise and a passion for driving security excellence in a global organization, we want to hear from you. Apply now to join our Enterprise Privileged Access Management team and help protect Roche's critical infrastructure and information assets.
Relocation benefits are not available for this job posting.
A healthier future drives us to innovate. Together, more than 100’000 employees across the globe are dedicated to advance science, ensuring everyone has access to healthcare today and for generations to come. Our efforts result in more than 26 million people treated with our medicines and over 30 billion tests conducted using our Diagnostics products. We empower each other to explore new possibilities, foster creativity, and keep our ambitions high, so we can deliver life-changing healthcare solutions that make a global impact.
Let’s build a healthier future, together.
Roche is an Equal Opportunity Employer.