Workday Security Administrator managing security configurations and translating business requirements into secure access models at Diconium. Collaborating with HR, IT, and Compliance on security-related tasks.
Responsibilities
You take ownership of Workday security configurations: from roles and security groups to domain and functional area permissions.
You translate business requirements into secure, scalable access models – especially for reports, proxies, and sensitive data areas.
You support and document ISO audits and help shape our IT security processes.
You continuously improve our Workday security setup – hands-on, structured, and with a strong focus on execution.
You manage access requests, incidents, and change implementations in close collaboration with HR, IT, and Compliance.
You maintain clear documentation and ensure transparency in all security-related configurations.
You will work closely the together with the Workday Core team leads from HCM, FIN, PSA, Integration & Reporting, as well business units.
Requirements
2+ years of proven experience in Workday Security Administration – ideally in an inhouse or consulting environment.
Solid understanding of Workday security architecture: domain policies, business process security, security groups, and report access.
Experience with audit preparation and compliance frameworks (e.g., ISO 27001).
A structured, proactive mindset and the ability to translate business needs into secure Workday configurations.
Strong communication skills in English (C1+); German is a plus.
Knowledge of Workday Business Administration (e.g., tenant setup, business processes)
Benefits
Professional & Personal Growth: Develop yourself both professionally and personally through training programs, free language courses, competence centers and an active tech community.
Flexible Work-Life Balance: Benefit from hybrid work, workation, flexible hours, parental support and sabbaticals.
Embrace Diversity & Sustainability: Engage in our Sustainability Hub, diverse communities, Diversity Taskforce and after-work activities.
Comprehensive Benefits: Enjoy public transport tickets, job bikes, health offers, supplementary insurances, a pension plan and various discounts.
Cybersecurity Engineer at Capgemini responsible for designing secure network architectures. Leading incident responses and collaborating on security projects to enhance infrastructure safety and efficiency.
Account Manager managing existing clients and acquiring new business in IT Security sector. Collaborating with client partners and developing sales strategies.
Epic Application Analyst managing projects and issues related to Epic software applications in healthcare. Collaborating with analysts and vendors to ensure system integrity and effective support.
Staff Information Security Engineer leading advanced threat detection and incident response at Proofpoint. Shaping strategies for complex security investigations and mentoring team members.
Infrastructure Engineer focused on the security and evolution of critical on - premise financial infrastructure. Key responsibilities include server management, incident response, and compliance audit preparation.
Director of Information Security & IT leading H1's security - first technology operations. Working at the intersection of data, AI - technology, and healthcare to improve patient outcomes.
Cybersecurity Intern at KPMG engaging in projects aimed at digital transformation and innovation. Collaborating with global teams while learning from industry leaders in various technologies.
Sales Development Representative responsible for proactive lead generation and pipeline development in cybersecurity sector. Collaborating with sales teams and engaging with enterprise clients in DACH region.
Principal Cybersecurity Engineer at Progress, focused on IAM governance and architecture strategy. Collaborating with teams for enterprise identity security governance and architectural oversight.
Information Security Manager at IT - Total protecting critical information and enhancing clients' resilience to cyber threats. Role involves strategy and operations in information security.