drjobs Network Security Consultant CyberArk PAM

Network Security Consultant CyberArk PAM

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Chennai - India

Monthly Salary drjobs

INR INR 2000000 - 4000000

Vacancy

1 Vacancy

Job Description

MustHave Skills:

  • 5 to 7 years of experience in deployment & implementation of Privileged Identity Management using CyberArk solutions for largescale customers across various industry verticals.
  • Play an active role in the execution of the project and demonstrate strong technical leadership.
  • Strong knowledge of the CyberArk privileged account security suite CyberArk versions 7.x 8.x 9.x and 10.x.
  • Experience in the use of CyberArk PACLI to automate tasks related to user and safe management.
  • Good understanding of CyberArk components like EPM OPM AIM etc.
  • Capture detailed requirements for the CyberArk solution based on input from platform owners ecosystem owners the target architecture and highlevel requirements.
  • Design and architecture of the overall CyberArk implementation.
  • Performing compliance checks on CyberArk for IT security safes and providing alerts and reports appropriately. Investigate provide RCA and resolve incidents.
  • Open to travel as and when required for deployment at customer sites.
  • Be a strong team player.
  • Advanced knowledge of Windows/VMware administration.
  • Advanced knowledge of Windows Cluster Server.
  • Strong grasp of network design application/infrastructure security concepts techniques technologies and tools.
  • Experience working in an on/offshore environment and a proven track record of delivering quality outcomes.
  • Customer service background able to empathize with customers and own the issues raised to resolution.
  • Leading team contributions to any queries requiring technical specialist input.

Other Required Skills:

  • Experience in deployment and implementation of any of the other PIM tools: CA PAM (Xceedium) BeyondTrust Quest/OneIdentity Thycotic ERPM.
  • Experience in using database client tools like Toad etc.
  • Experience in using standard protocols like SSH Telnet RDP etc. and related tools like Putty.
  • Experience working with network devices like firewalls routers etc.
  • Ability to understand customer scenarios and requirements (may include customized integration situations) and suggest solutions.
  • Excellent communication skills and ability to work with global counterparts.
  • Knowledge of basic networking.
  • Experience in Windows and Linux operating systems from PIM integration and debugging perspectives.
  • Exposure to virtual environments with experience in integrating ESX ESX(i) hosts with the PIM solution.
  • Good troubleshooting skills.
  • Runbook documentation.

Qualifications:

  • 57 years of strong PAM implementation experience.
  • Strong oral and written communication skills.
  • Customerfacing exposure is a must.
  • Open to travel requirements.

intrusion detection systems,vulnerability management,access,network security,security tools,risk assessment,cyberark pacli,communication skills,compliance regulations,opm,rdp,technical documentation,aim,identity management,windows cluster server,scripting languages,network design,windows os,ssh,security awareness training,windows administration,firewalls,routers,infrastructure security,project,cyberark,putty,linux os,telnet,firewall configurations,virtual environments,privileged identity management,implementation experience,security frameworks,epm,troubleshooting,incident response,vmware administration,project management,management,application security,privileged access management (pam),network protocols

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.