CyberArk Consultant


On Site
Depends on Experience
Accepts corp to corp applications
Contract - W2


CyberArk Consultant

Job Details

Dear Applicant,
One of my global consulting client is looking for CyberArk Consultant for full remote role. Please see below details and apply if interested to discuss further.

Job Title CyberArk Consultant
Location Frisco, TX
Duration Contract position

Job Description:

  • CyberArk Certified Delivery Engineer is must.
  • CyberArk SaaS Certified Professional preferred.
  • Migration experience from CyberArk On-Premises to CyberArk SaaS is preferred.
  • 8+ years of overall IT experience
  • PowerShell Scripting, Ansible, Salt Automation required.
  • 3+ years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers.
  • Requirements analysis, strategy, design, implementation, and migration for businesses
  • Supervision and development of staff on multiple projects, business development, and communications with executives
  • Demonstrates extensive abilities and/or a proven record of success utilizing the following when managing and producing deliverables for client engagements related to managing successful enterprise scale implementations within Information Security utilizing the Privileged Identity Management suite of products specifically design and implementation of CyberArk.
  • Responsible for Solution Design, Tool Implementation, privileged User account administration of various Windows and UNIX accounts using CyberArk components.
  • Integrating various platforms with Cyber-Ark, such as Windows servers, UNIX servers, Databases and networking Devices.
  • Creating and Managing Safes, platforms and Owners.
  • CPM policies management or redistribution.
  • Implementing the Password Upload Utility
  • Knowledge on CPM and PSM connector customization
  • Perform health check monitoring on all CyberArk severs to ensure consistent availability of system to end user.
  • Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities.