JOBSEARCHER

IT Security Analyst (She/ He/ They)

CapcoPoland, NYApril 16th, 2026
*We are looking for Poland based candidate. As an IT Security Analyst , you will play a key role in supporting a large-scale Secrets & Credential Management initiative. You will analyze current-state environments, identify control gaps, and define robust, scalable security requirements. Working across technical and business teams, you will help ensure that sensitive credentials are governed, controlled, and aligned with regulatory and operational expectations. We offer a flexible collaboration model based on a B2B contract, with the opportunity to work on diverse projects. Key Responsibilities Conduct end-to-end analysis of secrets and credential management practices across applications, infrastructure, and platforms Identify, classify, and document secrets, including ownership, usage, storage, lifecycle stage, and associated risks Assess control gaps (e.g., unmanaged credentials, hardcoded secrets, weak auditability) and define remediation approaches Define functional and non-functional requirements for centralized secrets management solutions Facilitate workshops with stakeholders to gather requirements, validate findings, and support governance activities Required Skills and Experience Experience in IT security analysis, security requirements engineering, or security governance within complex environments Strong understanding of IAM, PAM, least privilege, and secure access governance principles Knowledge of credential types (passwords, SSH keys, API keys, tokens, certificates, service accounts) Ability to translate security risks and control gaps into actionable requirements Strong communication and documentation skills, with the ability to collaborate across technical and non-technical teams Nice to have Experience with secrets management tools such as CyberArk, HashiCorp Vault, or cloud-native solutions Familiarity with security frameworks (ISO 27001, NIST, CIS Controls) Experience in transformation or migration projects involving credential centralization Exposure to regulated or highly controlled environments Experience supporting enterprise-scale security initiatives J-18808-Ljbffr