Job Title: Cyber Security Engineer, CyberArk
Role Type: Contract 6 + months
Location: Remote EST
PURPOSE:
- Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems. Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures.
- Perform activities from Installing and Setting up CyberArk to customizing/configuring it for Governance Policies and procedures identified during implementation of the Privilege Identity Management (PIM) system and its production support. Includes onboarding of privileged User IDs into CyberArk from Active Directory, UNIX, Linux, Windows, and zOS/RACF systems.
- Assist in and perform the day-day activities related to CyberArk including the development, testing and roll-out phase activities of the implementation and support.
- Must be someone who has performed CyberArk PIM implementations before and knows the best solutions for the issues faced normally throughout such projects.
- Manage and administer the safes, policies, and custom components of CyberArk application.
- Knowledge in implementing and supporting Application Identity Management (AIM).
- Develop and manage delivered integrations with CyberArk and other applications like TOAD, SQL Server Management Studio and VMware Horizon Client. Provide guidance during the enhancements of the PIM solution.
- Code/Customize the CyberArk product when needed and provide guidance and understanding of the consequences.
- Provide documentation of all steps followed and all the activities within those steps during the Implementation to FEPOC. Should be someone who has performed multiple PIM Implementations at large organizations using CyberArk. Requirements:
Qualifications
Ability to perform risk assessments and investigate cyber security incidents.
Ability to understand vulnerabilities at a technical level.
Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues.
Proficient in ethical hacking techniques.
Strong critical thinking ability and investigative/problem solving skills.
Education Level: Bachelor's Degree
Education Details: Computer Science, Information Technology, or related field
Experience: 5 years relevant IT security experience
In Lieu of Education
In lieu of a Bachelor's degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
Licenses/Certifications
CISSP Certified Information Systems Security Professional Upon Hire Req or
CISM - Certified Information Security Manager Upon Hire Req or
Certified Ethical Hacker (CEH) Upon Hire Req or
Certified Information Systems Auditor (CISA) Upon Hire Req
ESSENTIAL FUNCTIONS:
20% Assists with day-to-day support of security solutions.
20% Assists with engineering support and system administration of specialized cybersecurity solutions.
15% Solves complex problems and answers routine questions about the installation, operation, configuration, and customization of cybersecurity software.
15% Identifies potential conflicts with the implementation of any cybersecurity solutions.
10% Answers routine questions about the installation, operation, configuration, and customization of cybersecurity solutions.
10% Reviews and analyzes appropriate cybersecurity solution system logs for performance and functional anomalies.
10% Works with system design architects and project managers to provide security requirements.