IAM Engineer- CyberArk

Full Time 1 month ago
Employment Information

We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts


The ideal candidate will:

  • At least 36 months of Privileged Access Management domain experience
  • A quick learner and adaptable to changing environments
  • Have strong analytical skills and communication skills
  • Build strong professional working relationships with client personnel
  • Clear understanding of IAM solution design and configuration
  • Working in rotational shifts supporting client environment.
  • Deliver timely and high-quality work diligently
  • Identify issues and opportunities, and communicate them to appropriate senior member

Certification Required

  • CyberArk Sentry certified professional

Technical Skills Required:

  • At least 36 months of experience in CyberArk-PAM product

CyberArk Administration:

  • Manage and maintain the CyberArk Privileged Access Security Solution, including the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components.
  • Perform daily health checks, monitor system performance, and ensure the availability and reliability of the CyberArk environment.
  • Handle password rotations, policy updates, and access provisioning/de-provisioning.
  • Troubleshoot and resolve any issues related to CyberArk infrastructure and performance.
  • Implement best practices for privileged access management and ensure compliance with organizational security policies.
  • Credential Management:
    • Vaulting: Storing privileged credentials securely in a centralized vault with strong encryption
    • Automated Password Rotation: Regularly rotating passwords to reduce the risk of credential exposure
  • Access Control:
    • Just-in-Time (JIT) Access: Granting temporary privileged access to users only when needed, reducing the risk of prolonged exposure
    • Zero Standing Privilege: Advocate and deliver the removal of all persistent privileges for users within BSC.
  • Monitoring and Auditing:
    • Session Monitoring: Recording and monitoring privileged sessions to detect and respond to suspicious activities
    • Audit Logs: Maintaining detailed logs of all privileged access activities for compliance and forensic analysis