Our client is seeking a skilled and experienced CyberArk Security Engineer to collaborate with our chosen solution integrator on the implementation of CyberArk solutions, including Privilege Access Management (PAM), Endpoint Privilege Management (EPM), and Secure Cloud Access (SCA). The successful candidate will play a critical role in ensuring that these implementations meet our security requirements and business needs.
- Key Responsibilities:Collaboration and Coordination:
- Ensure alignment of implementation activities with organizational security policies and business objectives.
- Serve as a technical point of contact between our organization and the solution integrator.
- Work closely with our solution integrator to plan, design, and implement CyberArk solutions (PAM, EPM, and SCA).
- Implementation and Configuration:
- Facilitate the integration of CyberArk solutions with IT infrastructure, applications, and cloud environments.
- Customize CyberArk components to meet specific security requirements and use cases.
- Assist in the deployment and configuration of CyberArk solutions, ensuring proper setup and integration with existing systems.
- Administration and Maintenance:
- Develop and implement backup and recovery strategies for CyberArk components.
- Ensure regular updates, patches, and upgrades are applied to CyberArk systems to maintain security and performance.
- Oversee the ongoing administration, maintenance, and optimization of CyberArk environments.
- Security and Compliance:
- Implement and enforce least privilege access principles and secure privileged account management practices.
- Ensure CyberArk implementations comply with internal security policies, standards, and regulatory requirements.
- Endpoint Privilege Management (EPM):
- Monitor and analyze endpoint activities to detect and respond to potential security threats.
- Develop policies and controls to minimize risks associated with endpoint privilege escalation.
- Work with the integrator to deploy and configure CyberArk EPM to manage and secure endpoint privileges.
- Secure Cloud Access (SCA):
- Monitor and manage secure access controls to cloud resources, ensuring compliance with security best practices.
- Ensure SCA integration with cloud-native security tools and services to enhance cloud security posture.
- Collaborate with the integrator to implement CyberArk SCA to secure privileged access to cloud environments (AWS, Azure, GCP).
- Incident Management and Support:
- Collaborate with the security operations center (SOC) and other IT teams to resolve incidents and improve security posture.
- Respond to and investigate security incidents involving privileged access and endpoint activities.
- Provide technical support and troubleshooting for CyberArk-related issues in collaboration with the integrator.
- Documentation and Training:
- Stay current with the latest CyberArk features, updates, and security trends.
- Provide training and support to IT staff and end-users on CyberArk usage and best practices.
- Develop and maintain comprehensive documentation for CyberArk configurations, processes, and procedures.
- Qualifications:Bachelor’s degree in Computer Science, Information Technology, or a related field (or equivalent experience).
- Proven experience in implementing and managing CyberArk PAM, EPM, and SCA solutions.
- Strong understanding of cybersecurity principles, privileged access management, and identity and access management (IAM).
- Proficiency in configuring and managing CyberArk components, such as Vault, CPM, PSM, PVWA, EPM, and SCA.
- Experience with integrating CyberArk solutions with other security tools and IT infrastructure.
- Excellent troubleshooting, analytical, and problem-solving skills.
- Strong communication and interpersonal skills, with the ability to work effectively in a team-oriented environment.
- Relevant certifications (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) are a plus.
- Preferred Skills:Experience with scripting and automation using PowerShell, Python, or similar languages.
- Knowledge of other PAM solutions and IAM technologies.
- Familiarity with cloud environments (e.g., AWS, Azure) and securing cloud-based privileged access.
- Understanding of regulatory requirements and frameworks such as HIPAA, PCI-DSS, and NIST.