Info Security Engineer II

Overview

On Site
$45 - $50 hr
Contract - W2
Contract - Independent
Contract - 5+ mo(s)

Skills

CYBERARK
CYBER ARK
SENTRY
PAM
PRIVILEGED ACCESS MANAGEMENT

Job Details

Payrate: $45.00 - $50.00/hr.

Summary:
The main function of an info security engineer is to plan, coordinate, and implement security measures for information systems to regulate access to computer data files and prevent unauthorized modification, destruction. Step into the role of a Mid-Level CyberArk Engineer, where you will play a crucial supporting role in enhancing the Department of Transportation's (DOT) cybersecurity infrastructure. Working alongside senior engineers, you'll contribute to the deployment and ongoing maintenance of a sophisticated Privileged Access Management (PAM) solution. This role will see you engaging with key stakeholders, including Client integrators, to ensure the PAM system operates flawlessly across development, testing, and production environments.

Responsibilities:
  • Your daily responsibilities will involve assisting with the management of roles and safes, helping deploy software updates, and contributing to the preparation of reports that highlight the performance and security of the PAM tool.
  • Additionally, you'll be involved in identifying and mitigating security vulnerabilities, providing essential support for on-call troubleshooting and remediation efforts related to the PAM solution.
  • You'll also support annual disaster recovery testing, aid in documenting recovery and contingency plans, and assist with operating system patching on vault appliances.
  • Your role is critical in ensuring that the PAM solution not only meets but exceeds security requirements, following DOT s Change Management processes and contributing to the enhancement of reporting capabilities in line with Client requirements.
  • Joining our team means becoming a key player in securing critical infrastructure, offering a unique opportunity to grow your expertise in cybersecurity and privileged access management within a supportive and collaborative environment.

Requirements:
  • Performs day-to-day activities required to assist and identify technology solutions that meet enterprise requirements.
  • Maps functional requirements into technological requirements and identifies technologies that meet the technological requirements.
  • Conducts proof of concept, pilots and demos for the purposes of evaluating the suitability of given technologies for meeting requirements.
  • Evaluates the tradeoffs between competing solutions and develops quantitative driven analysis of alternatives.
  • Produces written analysis of research and recommendation papers that clearly describe the process followed, alternatives considered, evaluation criteria and rationale for recommendation and need for additional work.
  • CyberArk Sentry Certification Required: Current Certified CyberArk Sentry credential, affirming their expertise in managing and safeguarding privileged accounts within the CyberArk platform.
  • CyberArk Implementation Experience: One year of experience in designing and implementing integrated lifecycle management processes for CyberArk within an organization comparable in scale to the Department of Transportation (DOT), demonstrating a capability to support complex cybersecurity environments.
  • Server Administration Expertise: Three years of server administration experience is required, with specific proficiency in managing Windows Server 2019 and Red Hat Enterprise Linux (RHEL) 8 environments. This experience should highlight a strong foundational knowledge in operating systems, indicating the candidate's ability to maintain and optimize server infrastructure for reliability and performance.

Preferred skills:
  • Proficiency in CyberArk and SailPoint Integration: Demonstrated proficiency in seamlessly integrating CyberArk with SailPoint, showcasing the ability to unify privileged access management with comprehensive identity governance solutions, enhancing organizational security posture.
  • Comprehensive Active Directory Knowledge: Extensive experience with Active Directory, encompassing both front-end aspects such as account management and Group Policy, as well as back-end complexities including AD Schema, Public Key Infrastructure (PKI), and automation via PowerShell. This depth of knowledge ensures a robust and secure identity and access management framework.
  • Database Management Competence: Solid understanding of database management principles, specifically with SQL Server 2019. This includes proficiency in backups, indexing, integrity checks, installation, configuration, managing ports and protocols, creating maintenance plans, and effective troubleshooting. Additionally, skilled in data modeling and schema, with the ability to interpret and navigate Entity Relationship Diagrams, underscoring a well-rounded database administration skill set.
  • CyberArk Configuration Expertise: Proven capability in configuring CyberArk to ensure secure collaboration with a diverse array of systems and devices, including networks, iDRAC interfaces, applications, cloud services, storage solutions, servers, and appliances, guaranteeing the integrity and security of privileged access across the IT ecosystem.

Education/Experience:
  • Must have a minimum of 5 years of related experience providing business solutions engineering support, to include architectural design, engineering design, proof of concept development, pilots, analysis, results, and documentation.

Pay Transparency: The typical base pay for this role across the U.S. is: $45.00 - $50.00/hr. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience and the benefits package you select. Full-time employees are eligible to select from different benefits packages. Packages may include medical, dental, and vision benefits, 10 paid days off, 401(k) plan participation, commuter benefits and life and disability insurance.

For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy (;/span>

Aditi Consulting LLC uses AI technology to engage candidates during the sourcing process. AI technology is used to gather data only and does not replace human-based decision making in employment decisions. By applying for this position, you agree to Aditi s use of AI technology, including calls from an AI Voice Recruiter.

#AditiConsulting
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.