CyberArk Architect

Job Description:
Overall, 7 to 10 years of any Identity and Access Management, PAM tool experience. 3 to 5 years of CyberArk experience.

Primary position responsibilities include:
• Overall, 7 to 10 years of any Identity and Access Management, PAM tool experience.
• 3 to 5 years of CyberArk experience.
• Installation and configuration of CyberArk PAS solution, including: Enterprise Password Vault (EPV), Central Policy Manager (CPM), Password Vault Web Access (PVWA) , Privileged Session Manager (PSM), Privileged Session Manager Proxy (PSMP), Configuration of the Application Identity Manager (AIM)
• Managing and testing CPM plugins
• Engineering integration s to vault and rotate privileged application passwords
• Performing health check monitoring on all CyberArk servers
• Integration with enterprise applications as well as knowledge of any IDM.
• Maintenance and capacity planning for CyberArk including all the listed components
• Responsible for Privileged User account administration for various platforms including Windows, UNIX, LDAP, Databases
• Creating procedural documentation and help educate vault users and supporting IAM Teams with knowledge transfer
• Collaboration and partnerships with multiple security and technical teams
• Maintaining systems, tools, and configurations in alignment with enterprise technical and security policies and documented processes
Preferred Skills/Experience
• 5 to 7 years or more enterprise information security experience that included implementing and maintaining PAM tool or CyberArk password vault solution, components, technology plug-in, features, and services across a complex and global enterprise environment specifically Enterprise Password Vault (Privileged Accounts at OS and DB levels), Privileged Session Manager-PSM (Control and monitor privileged accesses), Discovery and Analysis tool
• Experience developing and maintaining metric based reports and KPIs to provide visibility on scope, coverage, identify gaps and enhancement opportunities for the IAM solutions or tool platforms
• Proven experience in translating Enterprise security standards and policies into effective CyberArk solution configurations and governance processes
• Demonstrated proficiency creating and managing Platforms, Policies and Safes within the CyberArk Solution
• Exceptional troubleshooting / supporting expertise with a root cause analysis mindset with a drive to eliminate repetitive or reoccurring performance issues
• Experience designing, developing, building, and implementing process workflows, forms, rules, password policies, Lifecycle Events, Reports and Access Certifications
• Document technical design, configuration, and customization specification documents
• Perform functional and technical requirements gathering and analysis for an enterprise-wide Identity & Access Management program
• Strong proficiency in written and verbal communication to describe highly technical information in an understandable level to any audience
• Strong documentation skills to provide validation of use cases, system functionality, and user acceptance testing
• Experience working with agile frameworks such as sAFE and Scrumban
• Demonstrated ability to mentor junior engineers for knowledge transfer and to increase core engineering proficiencies
• Willingness to learn and commitment to follow all policies and procedures in a technically diverse global enterprise IT organization
• Working knowledge of IT environment including service-oriented and IT architecture, industry trends and direction, system and technology integration, and IT standards, procedures and policies, and emerging technologies
• Basic knowledge of IT audit and control, governance, asset management, software licensing, product and vendor evaluation, and training delivery
• Extensive knowledge of technical troubleshooting
• Working knowledge of IT systems management including change control, software process improvement, and technical writing/documentation
• Basic knowledge of information assurance
• Working knowledge of information security architecture, security technologies, administration, audits, network and internet security, and computer crime
• Working proficiency of various technology tools. Ability to work cooperatively and professionally with co-work

If Interested please reply with below details
• Updated Resume
• Best time to talk
• Number to connect

Leave a Reply