Cyber Ark Administrator

Overview

On Site
Full Time

Skills

CyberArk Defender
CyberArk Sentry
Certification- ISSP
CISA
CISM
Active Directory
AWS and Azure
Unix
Linux
and Windows

Job Details



Overview:


The primary responsibilities include design, deployment, integration, administration, and daily operations of CyberArk Privileged Access System and password vault. Works closely with IT system administrators and application owners to support and enhance the existing Privilege Access Management (PAM) program. Qualified candidate should have proven experience in CyberArk Privileged Access Solution technologies.



Qualifications:



  • with a Bachelor's degree in business administration, Management Information Systems, Computer Science, or closely related field is required.

  • 3-5+ years of experience in Identity and Access Management with a focus on Privilege Access Management (PAM) and CyberArk technologies

  • Active Secret Clearance

  • CompTIA Security +

  • 3-5 years experience: CyberArk Defender, CyberArk Sentry

  • Security-related certification preferred (CISSP, CISA, CISM)

  • Experience with AWS and Azure

  • Experience with Active Directory

  • Experience with Unix, Linux, and Windows

  • PowerShell scripting preferred.

  • Knowledgeable of federation / single sign on (SSO) and multi-factor authentication (MFA) preferred.

  • Hands-on, results-oriented individual with a passion for winning and requiring minimal guidance.

  • Ability to take ownership of multiple projects, shifting priorities, and changing environments and landscapes.

  • Excellent verbal and written communication skills



Responsibilities:



  • Leads analysis of current state of the PAM program technological environment.

  • Recommend solutions for incremental improvements to PAM program.

  • Privilege Access Management reporting and metrics

  • Work closely with the Identity Access Management team, Infrastructure teams, application owners, and product managers to help drive technical adoption across organization.

  • Work with vendors and third parties to evaluate new products, features, and solutions.

  • Ensure regulatory requirements and industry best practices are followed for Identity and Access Management

  • Support large, cross functional, globally distributed, and complex projects.

  • Provide evidence for audit and compliance activities.

  • On call support of the identity and access management technologies

  • Remain current with security technology and trends for identity and access management in manufacturing, ecommerce, and retail.

  • Develop relationships to promote security awareness and PAM program best practices.


#cjpost