drjobs Sr Cybersecurity Engg with Strong PAM and IAM expert- Hybrid in CA

Sr Cybersecurity Engg with Strong PAM and IAM expert- Hybrid in CA

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Oakland, CA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

This position is hybrid working Client office. The assigned work location will be within the Client Service Territory.

This Position is Hybrid in Oakland CA have to be 3 Days onsite

Job Responsibilities

  • Product Management & Operations: Administration and support of Beyond Trust Password Safe in either a primary or secondary capacity depending on the product and the experience level of the successful candidate.
  • IT Product Analysis: Collaborate and confer with the accountable planning organization to develop the technical and business strategic vision and how it applies to the targeted products or services. Understand the product positioning key benefits and target users. Gather and analyze changing business and user requirements. In partnership with the planning organization research new market technologies and make recommendations based on the Companys future business needs and processes.
  • Product Lifecycle: Manage the continuous product lifecycle from research planning and implementation to retirement including cost management. Introduce new innovative solutions create support structure and integrate product with company standards. Involved in the implementation including installation testing communicating and documenting of the product. Advocates and communicates key messages and strategies promotes the product educates and trains support staff.
  • Solution Design: Interface with internal IT stakeholders to understand and analyze a projects business and technical requirements. Have the ability to translate requirements into a detailed solution design leveraging the targeted IT products or services for teams to be able to properly deploy and implement. Be familiar with IT planning methodologies. Be able to provide accurate project timelines labor cost estimates and equipment cost estimates to the project. Have the ability to manage multiple assigned projects.
  • Capacity Planning: Manage the enterprisewide technical capacity for the targeted IT products or services. Work with projects to determine the best use of existing capacity for resource allocation. Partner with key stakeholders to determine and understand future capacity requirements. Analyze areas of opportunities to optimize costs of IT products or services. Engage with the products vendor to manage the process to request additional units including working with projects needing new product contracts and licenses. Perform contract management and be responsible for understanding and complying with the products existing maintenance contracts and/or licenses.
  • Provide operational support and work Incidents Work Orders and Change Control (BMC Remedy)
  • Participate in an OnCall rotation (24x7)
  • Support: Work closely with IT professionals to troubleshoot and resolve issues. Drive conventions and standards (such as usage or configuration) across products to maximize user experience. In the absence of a thirdtier support specialist perform the role of thirdtier support to other IT professionals.
  • Vendor Technical Liaison: Participate in business technical and contract negotiations with vendors. Act as a conduit for vendor relationship licensing and incident management. Be an advocate for business unit and IT operational clients to ensure business requirements are cost effective and needs are met. Provide budget support to IT professionals and stakeholders.
  • Documentation: Develops a variety of documentation such as strategies plans designs usage or configuration standards policies guidelines user requirements roadmaps reports metrics process manuals configuration manuals and other documentation specific and necessary for the targeted product or service.

Qualifications

Minimum:

  • Bachelors degree in computer science Engineering or equivalent work experience
  • 8 Years experience in Cyber Security or Information Technology with a minimum of 3 years focus in Privileged Access Management
  • Demonstrated experience with Identity and Access Management technologies.
  • Demonstrated experience with managing maintaining and supporting a Privileged Access Management tool at an enterprise level.

Desired:

  • Masters degree in computer science or Information Security or similar field; or equivalent experience
  • Experience with provisioning and password safe tools such as Beyond Trust Password safe Powerbroker for Windows.
  • Experience with Privileged Access Management Processes including onboarding account management password rotation password safe policies and account brokering for Windows policies.
  • Strong knowledge of Windows servers and workstations
  • Familiarity with SSH key management
  • Strong knowledge of Active Directory and other LDAP directories
  • Experience with multifactor authentication such as RSA SecurID
  • Understanding of Public Key Infrastructure (PKI)
  • Understanding of rolebased access controls (RBAC)
  • Ability to reverse engineer technology & configuration for troubleshooting.

Knowledge Skills and Abilities:

  • Strong written and good oral communication ability to document diagrams and business cases and collaboration skills.
  • Demonstrated ability to work both as an individual contributor and in a team environment
  • Proven customer facing skills and the ability to effectively communicate at both a highlevel and a technical level
  • Security minded and ability to handle evidence containing sensitive information
  • Strong understanding of information security fundamentals concepts and strategy
  • Understanding of modern rolebased access and delegation security models
  • Understanding of risk assessment and analysis
  • Understanding of SOX and/or other compliance framework requirements and evidence gathering
  • Excellent written and verbal communications skills
  • Demonstrated technical knowledge of and direct experience working with the following technologies:
    • Password Vaulting
    • Windows Servers
    • Windows Workstations
    • Active Directory
    • Group Policy Management
    • Heterogenous Authentication

Employment Type

Full Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.