Remote opportunity for CyberArk Consultant at Downey, California, USA |
Email: [email protected] |
From: Raghu, West Advanced Technologies, Inc [email protected] Reply to: [email protected] Hi, My name is Raghu and I am a Staffing Specialist at West Advanced. I am reaching out to you on an exciting job opportunity with one of our clients. Please go through the Job description and let me know if you are comfortable with the requirement. please share you updated resume and let me know the best time to reach you to discuss Job Title: CyberArk Location: Remote, Downey, CA, 90242 Duration: 12 Months Position Description: An Information Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements. The Information Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability. The Information Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents. Skills Required : The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing. Skills Preferred : Proficient with CyberArk Endpoint Privilege Manager and CyberArk EPM. Knowledge of EPM policies, configurations, and deployment. Understanding of CyberArk architecture and components. Ability to design, deploy, and manage CyberArk EPM solutions. Expertise in creating, managing, and enforcing least privilege policies. Proficient in Loosely Connection Device onboarding and troubleshooting connection and password rotation issues. Understanding of application control and privilege management. Strong technical skills in defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution. Strong technical skills with installation, integration, and deployment of CyberArk Endpoint Privilege Management agent Possess strong troubleshooting skills to diagnose and resolve issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments. Understanding and familiarity with Operating Systems (Unix, Linux, Windows), Network devices, and databases (SQL, Oracle, etc.) Proficient in managing and securing various operating systems, including Windows, Linux, and Unix-based systems, A strong understanding of security concepts, including protection, detection and response (EDR), and endpoint compliance. Possess practical communication skills to interact with stakeholders, team members, and vendors and collaborate on security initiatives, incident response efforts, and knowledge sharing. Familiarity with programming language, preferably Python and Power script. Strong analytical and problem-solving skills and ability to troubleshoot and resolve complex issues. Excellent written and verbal communication skills and ability to explain technical concepts to non-technical stakeholders. Strong organizational and time management skills. Experience Required: This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation. At least three (3) years of that experience must be in information security analysis. Experience Preferred: 5+Experience with overall CyberArk architecture, components, and interdependencies like CyberArks Vault, including installation, configuration, and maintenance. 5+ years of experience with installation, integration, and deployment of CyberArk Endpoint Privilege Management 5+ years of experience with onboarding and implementing the Loosely Connection Device feature within the CyberArk EPM solution. 5+ years of experience defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution. 5+ years of experience troubleshooting, diagnosing, and resolving issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments. 5+ years of experience implementing the Just in Time feature within the CyberArk EPM solution. 5+ years of experience managing and securing various operating systems, including Windows, Linux, and Unix-based. 5+ years of experience with CyberArk Privileged Access Management routine tasks- Access control, User entitlements, password policy, etc. 5+ years of experience integrating CyberArk solutions with other security tooling, including IAM endpoint management logging, ticketing system, multi-tenant environment, and software distribution tool. 5+ years of experience with CyberArk EPM global policy standards and agent package deployments 5+ years of experience with scripting skills (e.g., Power, Bash) to automate routine tasks, streamline processes, and integrate CyberArk EPM with other security tools and platforms. 5+ years of experience with cloud infrastructure platforms like AWS/Azure integration with CyberArk. 5+ years of understanding of SSO (OAuth, OpenID, SAML, etc.) 5+ years experience leading or contributing to cybersecurity projects, especially those involving endpoint protection and privilege management solutions. Education Required: This classification requires the possession of a bachelors degree in an IT-related or Engineering field. Additional qualifying experience may be substituted for the required education on a year-for-year basis. Details Required: Full Legal Name: Phone Number: Email ID: Current Location: Last 4 digits SSN: Visa Status: Willing to relocate: Best time reach: Availability for the Interview: Can come for in person interview: DOB: Education passed out year: Thanks & Regards, Raghu Nunna Accounts Manager West Advanced Technologies, Inc [email protected] Serving government agencies for 22 Years www.wati.com Keywords: access management information technology golang California Idaho Louisiana Remote opportunity for CyberArk Consultant [email protected] |
[email protected] View All |
09:00 PM 06-Jun-24 |