Roche

Unix Access Management - Engineer (Redhat IDM)

San Jose, Costa Rica Full time

At Roche you can show up as yourself, embraced for the unique qualities you bring. Our culture encourages personal expression, open dialogue, and genuine connections,  where you are valued, accepted and respected for who you are, allowing you to thrive both personally and professionally. This is how we aim to prevent, stop and cure diseases and ensure everyone has access to healthcare today and for generations to come. Join Roche, where every voice matters.

The Position

We are seeking a Unix Access Management Engineer (Red Hat IDM) to serve as a trusted technical leader and independent expert within our Enterprise Privileged Access Management (PAM) team. In this role, you will drive the design, implementation, and optimization of Unix access management infrastructure while leading the analysis of moderately complex cybersecurity incidents. You will bridge deep technical expertise with business acumen to champion security excellence across Roche's global identity and access management infrastructure, protecting our information and assets from unauthorized access and cyber threats.

The Opportunity

This position offers a unique blend of strategic influence and hands-on technical leadership within a multicultural, global team. You will work across multiple Identity and Access Management (IAM) products, managing end-to-end security analysis tasks, leading security incidents, and fostering continuous improvement in security operations and best practices.

Key Responsibilities

Unix Access Management & Infrastructure Leadership

  • Lead the design, integration, and automation of Unix Access Management systems using Red Hat IDM, with Centrify product knowledge a significant advantage

  • Provide strategic consultations with stakeholders to identify security requirements, design system integrations, and develop implementation roadmaps for enterprise initiatives

  • Lead large-scale migrations of virtual machines to Red Hat IDM infrastructure

  • Enable and strengthen Red Hat IDM infrastructure and monitoring capabilities to support high-volume VM environments across cloud and on-premises data centers globally

Security Analysis & Incident Management

  • Independently lead analysis of moderately complex cybersecurity incidents and technical problems, defining security scope and driving root cause analysis

  • Participate in and lead troubleshooting efforts as part of 2nd or 3rd level support with 24x7 on-call availability for major and critical issues

  • Deliver comprehensive security requirements, designs, and validation of effective controls

  • Apply advanced analytical reasoning to identify security patterns and threats

Stakeholder Collaboration & Advisory

  • Collaborate with key business partners to understand and address their security needs and concerns

  • Act as a trusted advisor, managing relationships with diverse security stakeholders across functional areas

  • Define and drive stakeholder engagement strategies for complex initiatives, facilitating workshops and resolving conflicts

Operational Excellence & Continuous Improvement

  • Manage day-to-day Tier 3 operational support, performance optimization, and lifecycle management of Unix access management infrastructure

  • Stay current with latest security tools, techniques, and best practices; recommend improvements and strategic enhancements

  • Coach and mentor peers and junior colleagues in this technology area

  • Proactively shape team processes and contribute to Communities of Practice

Technical & Process Development

  • Apply CI/CD methodologies to maintain and develop infrastructure

  • Implement ITIL, GxP, Product Management, and Agile Methodologies (Request, Incident, Change, and Problem Management)

  • Translate business requirements into strategic implementation plans aligned with organizational objectives

  • Apply tools and principles related to requirements analysis, data management, and process optimization

Additional Duties

  • Occasional international travel as required

  • Active engagement in self-development with actionable growth plans

  • Follow and help establish engineering standardization processes

Who You Are

Education & Experience

  • Bachelor's Degree in Computer Science, Engineering, or related discipline (or equivalent industry-accredited certification and prior working experience)

  • Robust experience working in a major global organization, preferably in a regulated industry

  • Demonstrated ability to independently manage end-to-end security analysis tasks and lead analysis of moderately complex cybersecurity incidents

  • Proven track record of effectively managing relationships with diverse cross-functional stakeholders on medium to large-sized engagements

  • Successful history of championing accountability through security incident lead and/or security project owner roles

Core Technical Skills

  • Red Hat IDM expertise (Centrify experience highly valued)

  • Unix Access Management and IAM engineering with strong hands-on technical background

  • Privileged Access Management (PAM) and Cloud IAM knowledge (AWS, Azure, GCP)

  • Linux access management with familiarity of SSSD or Red Hat IDM

  • Process automation and LDAP experience

  • Scripting & Infrastructure Automation: Python, PowerShell, Ansible, YAML

  • API & Integration: RestAPI implementation and usage

  • Containerization: Docker experience

  • DevOps & Infrastructure as Code (IaC): Toolchain support and development capability

  • Advanced analytical skills: Security pattern recognition, threat identification, and root cause analysis

Essential Soft Skills & Attributes

  • Trusted Advisor mentality: Bridge technical and business perspectives to build strong stakeholder relationships

  • Proactive problem-solver: Navigate ambiguous requirements and complex stakeholder environments independently

  • Mentor & leader: Demonstrated ability to coach colleagues and provide guidance on cybersecurity best practices

  • Excellent communication: Strong spoken and written English with outstanding documentation, negotiation, and facilitation skills

  • Cultural awareness: Proven interpersonal skills to interact effectively with individuals across multiple countries and cultures

  • Collaborative approach: Supportive, proactive engagement with colleagues across teams

  • Customer-focused: Highly responsive to product delivery and support needs

  • Continuous learner: Willingness to continually evolve technical and soft skills; committed to engineering excellence

Preferred Qualifications

  • Experience with DevOps toolchains and Infrastructure as Code development

  • Knowledge of GxP and Product Management methodologies

  • Active participation in Communities of Practice and process improvement initiatives

  • Track record of identifying and implementing organizational process improvements

Ready to make an impact on enterprise security? If you are a skilled Unix Access Management engineer with Red Hat IDM expertise and a passion for driving security excellence in a global organization, we want to hear from you. Apply now to join our Enterprise Privileged Access Management team and help protect Roche's critical infrastructure and information assets.

Relocation benefits are not available for this job posting.

 

 

Who we are

A healthier future drives us to innovate. Together, more than 100’000 employees across the globe are dedicated to advance science, ensuring everyone has access to healthcare today and for generations to come. Our efforts result in more than 26 million people treated with our medicines and over 30 billion tests conducted using our Diagnostics products. We empower each other to explore new possibilities, foster creativity, and keep our ambitions high, so we can deliver life-changing healthcare solutions that make a global impact.


Let’s build a healthier future, together.

Roche is an Equal Opportunity Employer.