Role : CyberArk SME L3
Location : Berkeley Heights, NJ (Onsite)
8+ years of experience in operations OR deployment & implementation of Privileged Access Management using CyberArk solution for large scale customers across various industry verticals.
Develop and execute strategies for implementing and managing CyberArk PAM solutions to meet the business needs of our clients.
Experience in PAM Implementation/PAM/EPM-Design & Architecture.
Collaborate with clients to understand their specific requirements, translate them into technical solutions, and provide consultation.
Stay up to date with the latest PAM, EPM, CCP and AAM features, security trends, and best practices to ensure clients' solutions are cutting-edge and secure.
Collaborate with cross-functional teams, including developers, engineers, and project managers, to deliver successful CyberArk implementations.
Technical Requirements
Should have experience with Cyber-Ark Privileged Access Security (PAS) suite.
Implementation of Privileged Access Management and Endpoint Privilege Manager tool.
Strong knowledge of PAM CyberArk Core PAS Vault, Central Credential Provider, and Application Access Manager architecture and implementation.
Implementing and maintaining the CyberArk PAM platform (Vault, PSM, PVWA, CPM, PSM for SSH, AD Bridge).
Integrating all platforms with CyberArk such as UNIX servers, Windows servers, Databases, and networking Devices.
Creating and Managing Safes, platforms, and Owners.
Hands-on experience or knowledge on Configuring PTA, EPM.
CPM policies and Password Upload Utility implementation or redistribution.
Handson experience of Account and target system onboarding onto CyberArk.
Knowledge of SQL, PLSQL, UNIX, Active Director, Windows etc.
Advanced knowledge of windows/VMware administration.
Advanced knowledge of Windows Cluster Server.
In depth and hands on knowledge of CyberArk PACLI to automate tasks such as user and safety management.
Experience using LDAP, Active Directory.
Experience in Windows and Linux operating systems with PAM Solution
Knowledge of virtual environments with experience in integrating ESX, ESX(i) hosts with the CyberArk solution.
Good to have relevant certificates like (any of the below):
CyberArk Certified Trustee.
CyberArk Certified Defender.
CyberArk Certified Sentry.