We are looking for a of IAM resource with 3+ years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts
The ideal candidate will:
- At least 36 months of Privileged Access Management domain experience
- A quick learner and adaptable to changing environments
- Have strong analytical skills and communication skills
- Build strong professional working relationships with client personnel
- Clear understanding of IAM solution design and configuration
- Working in rotational shifts supporting client environment.
- Deliver timely and high-quality work diligently
- Identify issues and opportunities, and communicate them to appropriate senior member
Certification Required
- CyberArk Sentry certified professional
Technical Skills Required:
- At least 36 months of experience in CyberArk-PAM product
CyberArk Administration:
- Manage and maintain the CyberArk Privileged Access Security Solution, including the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and other related components.
- Perform daily health checks, monitor system performance, and ensure the availability and reliability of the CyberArk environment.
- Handle password rotations, policy updates, and access provisioning/de-provisioning.
- Troubleshoot and resolve any issues related to CyberArk infrastructure and performance.
- Implement best practices for privileged access management and ensure compliance with organizational security policies.
- Credential Management:
- Vaulting: Storing privileged credentials securely in a centralized vault with strong encryption
- Automated Password Rotation: Regularly rotating passwords to reduce the risk of credential exposure
- Access Control:
- Just-in-Time (JIT) Access: Granting temporary privileged access to users only when needed, reducing the risk of prolonged exposure
- Zero Standing Privilege: Advocate and deliver the removal of all persistent privileges for users within BSC.
- Monitoring and Auditing:
- Session Monitoring: Recording and monitoring privileged sessions to detect and respond to suspicious activities
- Audit Logs: Maintaining detailed logs of all privileged access activities for compliance and forensic analysis