Monokee s.r.l.

Monokee s.r.l.

Email: monokee@monokee.it
About the company:

The interview will be held in Italian or English.

Monokee is a next-generation cybersecurity framework for Identity and Access Management that orchestrate centralized, federated, and decentralized identity models.
Monokee's core functionalities revolve around Access Management (AM), with additional features leaning towards Identity Governance and Administration (IGA) and Privileged Access Management (PAM).

Monokee's top value point resides in its unique Visual Identity Orchestrator, a drag-and-drop interface to build authentication processes starting from predefined blocks and connecting them in a flow chart fashion. Monokee's patented multi-domain feature enables digital identities to access different domains through a single authentication process. Last but not least, with analysts foreseeing that a decentralized identity (Self-Sovereign Identity) model will become a standard soon, Monokee SSI solution is ready to handle the task.

The macro projects for this year are:

# Cybersecurity-as-a-Service: Continuous Adaptive Trust
In a world where classic usernames and passwords are stolen daily, and cybercriminals violate systems, trusting someone is an often overlooked challenge. Join Athesys to achieve Zero Trust in every aspect of the cybersecurity processes. The candidate will work with the R&D team to provide a toolbox of artificial intelligence instruments for assessing, adapting, and managing remote entities' trust (systems and users alike).
This project is suitable for both research and development thesis as, depending on the student’s preferences, it can include coding in multiple languages, mathematical modeling, and integration activities.

# Identity-as-a-Service: digital identities in the Web3.0 and Metaverse
Digital identity nowadays has an obvious problem: users need complete control of their identities. In other words, a user is bound to the chosen Identity Provider (SPID, Google, Facebook, or others). If the service they provided fails or the identity provider closes, all the users would lose their digital identity. The Self-Sovereign Identity paradigm (SSI) aims to migrate from a decentralized ecosystem to a distributed paradigm where users fully own and control their digital identities. The candidate will work on decentralized technologies (smart contracts, verifiable distributed ledgers, mobile wallets) and verifiable credentials with direct usage in the enterprise workforce identity ecosystems.
This project is suitable for both research and development thesis as, depending on the student’s preferences, it can include coding in multiple languages, mathematical modeling, and integration activities.

# Critical infrastructures and defense in depth: security by design
Much like individuals, enterprises and nation-state actors require a set of programs, protocols, and technologies to protect their digital existence. With Athesys, the candidates will learn to assess, deploy, configure, and manage cybersecurity tools and solutions. This project includes learning and certification paths in multiple security branches such as Privileged Access Management (PAM), Security Information and Event Management (SIEM), Next-Generation Firewalls (NGF), sandboxes and virtualization technologies, Mobile Device Management (MDM), and many others.
This project is suitable for the development and integration thesis and, depending on the student’s preferences, it can include coding in multiple languages and integration activities. ## Book your interview here: https://outlook.office365.com/owa/calendar/DrMattiaZago@athesys.it/bookings/