Info Security Engineer V

Overview

On Site
$50 - $52 hr
Contract - Independent
Contract - W2
Contract - 5+ mo(s)

Skills

CYBERARK
CYBER ARK
SENTRY
PAM
PRIVILEGED ACCESS MANAGEMENT

Job Details

Payrate: $50.00 - $52.00/hr.

Summary:
Step into the role of a Mid-Level CyberArk Engineer, where you will play a crucial supporting role in enhancing the Department of Transportation's (DOT) cybersecurity infrastructure. Working alongside senior engineers, you'll contribute to the deployment and ongoing maintenance of a sophisticated Privileged Access Management (PAM) solution.

Responsibilities:
  • Responsible for providing unique cyber domain expertise and guidance to the delivery team and stakeholders.
  • Work may encompass one or more specialty areas of cyber security, cyberspace, and cyber operations, including providing expert knowledge and insight into compliance, cyber hunt, incident response, risk and vulnerability assessment, and emerging cyber threats requirements.
  • Guiding technical support to penetration testers, incident handlers, cyber analysts, and product support personnel relative to the cyber arena.
  • Assisting in the management of complex networks and systems of differing classification levels systems.
  • Integrating cyber security requirements with communication and IT, and utilizing other principles in the professional body of knowledge.
  • Performs research, design evaluation, technical development, system integration planning, and other tasks in specific technical areas.
  • May be responsible for complex cyber, technical, engineering, and architecture tasks. Often coordinates and guides the activities of technical staff members assigned to specific tasks.
  • May supervise and/or guide a broad team of technical staff members/engineers.

Qualifications:
  • Must have a minimum of 5 years of related experience providing business solutions engineering support, to include architectural design, engineering design, proof of concept development, pilots, analysis, results, and documentation.
  • Performs day-to-day activities required to assist and identify technology solutions that meet enterprise requirements.
  • Maps functional requirements into technological requirements, and identifies technologies that meet the technological requirements.
  • Conducts proof of concept, pilots and demos for the purposes of evaluating the suitability of given technologies for meeting requirements.
  • Evaluates the tradeoffs between competing solutions and develops quantitative driven analysis of alternatives.
  • Produces written analysis of research and recommendation papers that clearly describe the process followed, alternatives considered, evaluation criteria and rationale for recommendation and need for additional work.

Desired Requirements:
  • CyberArk Sentry Certification Required: Current Certified CyberArk Sentry credential, affirming their expertise in managing and safeguarding privileged accounts within the CyberArk platform.
  • CyberArk Implementation Experience: One year of experience in designing and implementing integrated lifecycle management processes for CyberArk within an organization comparable in scale to the Department of Transportation (DOT), demonstrating a capability to support complex cybersecurity environments.
  • Server Administration Expertise: Three years of server administration experience is required, with specific proficiency in managing Windows Server 2019 and Red Hat Enterprise Linux (RHEL) 8 environments. This experience should highlight a strong foundational knowledge in operating systems, indicating the candidate's ability to maintain and optimize server infrastructure for reliability and performance.

Preferred Skills:
  • Proficiency in CyberArk and SailPoint Integration: Demonstrated proficiency in seamlessly integrating CyberArk with SailPoint, showcasing the ability to unify privileged access management with comprehensive identity governance solutions, enhancing organizational security posture.
  • Comprehensive Active Directory Knowledge: Extensive experience with Active Directory, encompassing both front-end aspects such as account management and Group Policy, as well as back-end complexities including AD Schema, Public Key Infrastructure (PKI), and automation via PowerShell. This depth of knowledge ensures a robust and secure identity and access management framework.
  • Database Management Competence: Solid understanding of database management principles, specifically with SQL Server 2019. This includes proficiency in backups, indexing, integrity checks, installation, configuration, managing ports and protocols, creating maintenance plans, and effective troubleshooting. Additionally, skilled in data modeling and schema, with the ability to interpret and navigate Entity Relationship Diagrams, underscoring a well-rounded database administration skill set.
  • CyberArk Configuration Expertise: Proven capability in configuring CyberArk to ensure secure collaboration with a diverse array of systems and devices, including networks, iDRAC interfaces, applications, cloud services, storage solutions, servers, and appliances, guaranteeing the integrity and security of privileged access across the IT ecosystem.

Pay Transparency: The typical base pay for this role across the U.S. is: $50.00 - $52.00 /hr. Final offer amounts, within the base pay set forth above, are determined by factors including your relevant skills, education and experience and the benefits package you select. Full-time employees are eligible to select from different benefits packages. Packages may include medical, dental, and vision benefits, 10 paid days off, 401(k) plan participation, commuter benefits and life and disability insurance.

For information about our collection, use, and disclosure of applicant's personal information as well as applicants' rights over their personal information, please see our Privacy Policy (;/span>

Aditi Consulting LLC uses AI technology to engage candidates during the sourcing process. AI technology is used to gather data only and does not replace human-based decision making in employment decisions. By applying for this position, you agree to Aditi s use of AI technology, including calls from an AI Voice Recruiter.

#AditiConsulting
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.