Overview
Remote
$80 - $85
Contract - W2
Skills
CyberArk
PAM
EPV
CPM
PVWA
PSM
PTA
Job Details
CyberArk Configuration and Management
- Configure the CyberArk environment to align with project requirements, including:
- Access management and control models.
- Authentication and authorization configurations.
- Role-based group permissions.
- Design and implement Safe and Data Permission structures in the Vault adhering to naming conventions and organizational standards.
- Manage Master Policy configurations and platforms, including the creation and testing of policies for new account groups.
- Define and implement CyberArk workflows and privileged account controls tailored to organizational needs.
Privileged Account and Credential Management
- Load, verify, and onboard credentials for privileged accounts.
- Prioritize and manage accounts based on rollout plans and business requirements.
- Pilot, test, and deploy automated credential rotation for supported platforms.
- Migrate accounts from legacy systems to CyberArk using tools like Auto-Detection and Password Upload Utility.
Customization and Integration
- Gather requirements and coordinate with CyberArk Extensions Services for customizations and plug-ins.
- Configure and test CPM plug-ins, PSM Universal Connections, PVWA integrations, and REST API capabilities.
- Assist in creating PowerShell scripts and optimizing REST API usage for PAM solution management.
Session Management and Threat Analytics
- Configure and enable Privileged Session Manager (PSM) and PSM for SSH for secure connections, live session monitoring, and audits.
- Implement Privileged Threat Analytics (PTA) for environment monitoring and optimization.
Operations and Maintenance
- Oversee daily system operations, performance, and health monitoring of the CyberArk infrastructure.
- Provide first-level technical support and liaise with CyberArk support teams as needed.
- Utilize PAM Reporter for troubleshooting and incident resolution.
Documentation and Training
- Draft technical and process documentation for CyberArk configurations, workflows, and best practices.
- Conduct training sessions for internal personnel on CyberArk operations and maintenance.
Ongoing Support and Enhancements
- Troubleshoot problems on a day-to-day basis and provide solutions to fix the security problems.
- Experience in managing EDR tool to stop execution of malicious code, block zero-day exploits, kill processes, contain command, and control callbacks.
- Investigate, analyze, and evaluate new technologies and risks.
- Experience in planning and designing the enterprise security architecture.
- Assist with onboarding local, networking device, root, and service accounts, testing environments in ITSD and DAS.
- Support software upgrades, such as v14 LTS or greater
Client-Facing Responsibilities: Collaborate directly with clients to communicate technical and functional aspects of CyberArk solutions, manage expectations, and build positive, long-term relationships to ensure successful project outcomes.
Qualifications
- Bachelor s degree in Information Security, Computer Science, or a related field.
- 10+ years of hands-on experience with CyberArk PAM solutions, including installation, configuration, and management.
- Proficiency in CyberArk components such as
- EPV - Enterprise Password Vault
- CPM - Central Policy Manager
- PVWA - Privileged Vault Web Access
- PSM - Privileged Session Manager
- PTA - Privileged Threat Analytics
- Experience with REST APIs, PowerShell scripting, and workflow automation.
- Strong understanding of access management, privileged account management, and security policies.
- Ability to troubleshoot and resolve issues related to CyberArk and PAM implementations.
- Excellent documentation and communication skills.
Preferred Skills
- Certification in CyberArk Defender or Sentry.
- Experience with non-out-of-the-box platform customizations.
- Knowledge of secure coding practices and regulatory compliance frameworks.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.