Similar Jobs
B.Tech/M.Tech/MS/MBA
Experience—5 to 8 years
5+ years of experience in implementation or shadowing of PAM projects using CyberArk
Experience in implementation or shadow at least two PAM engagements, including requirements gathering, analysis, design, development, testing, deployment, and application support
The key job responsibilities will be to:
· Shadow implementation of large-scale Identity and Access Management (IAM) solutions
· Advanced debugging and troubleshooting of issues, including interacting with technology vendors
· Contribute to eminence activities, such as white-papers pertaining to IAM technologies
· Assist in requirements gathering, design documentation for IAM technologies
· Contribute towards customizing, configuring, and developing IAM solution integrations using requirements and design and manage project deliverables to successful completion
· Contribute towards process compliance activities by identifying and driving initiatives relevant to project delivery and enable reusability
Required:
· B.Tech/M.Tech/MS/MBA
· Overall 5+ years of experience in CyberArk implementation or shadow projects
· Hands-on experience with CyberArk SaaS versions (CyberArk PCloud or CPC)
· Knowledge of CyberArk Secure Infrastructure Access (SIA) and CyberArk Endpoint Privilege Manager (EPM)
· Experience in implementation or shadowing at least two PAM engagements
· Strong exposure to onboarding various platform accounts in CyberArk
· Development and management of Safes, platforms, and CPM policies
· Good knowledge in development of PSM auto IT scripts, CPM connectors, and PACLI/Password Upload Utility
· Performed health check monitoring on all CyberArk servers
· Familiar with Disaster Recovery setup, DNA, and components like PSMP, OPM, AIM, Viewfinity, etc.
· Strong communication and interpersonal skills
Preferred:
· CyberArk CDE-PAM and CDE-CPC certifications
· Other PAM or Security domain certifications
· Experience with broader IT/Security technologies (Active Directory, DNS, Exchange, Firewalls, VPNs, PKI, etc.)