Description

Job Description 
Purpose:
Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems. Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures.
• Perform activities from Installing and Setting up CyberArk to customizing/configuring it for Governance Policies and procedures identified during implementation of the Privilege Identity Management (PIM) system and its production support. Includes onboarding of privileged User IDs into CyberArk from Active Directory, UNIX, Linux, Windows, and zOS/RACF systems.
• Assist in and perform the day-day activities related to CyberArk including the development, testing and roll-out phase activities of the implementation and support.
• Must be someone who has performed CyberArk PIM implementations before and knows the best solutions for the issues faced normally throughout such projects.
• Manage and administer the safes, policies, and custom components of CyberArk application.
• Knowledge in implementing and supporting Application Identity Management (AIM).
• Develop and manage delivered integrations with CyberArk and other applications like TOAD, SQL Server Management Studio and VMware Horizon Client. Provide guidance during the enhancements of the PIM solution.
• Code/Customize the CyberArk product when needed and provide guidance and understanding of the consequences.
• Provide documentation of all steps followed and all the activities within those steps during the Implementation to FEPOC. Should be someone who has performed multiple PIM Implementations at large organizations using CyberArk.

Qualifications
Education Level: Bachelor’s degree in computer science, Information Technology, or related field

Preferred Qualifications
Knowledge, Skills and Abilities (KSAs)
Ability to perform risk assessments and investigate cyber security incidents. , Advanced
Ability to understand vulnerabilities at a technical level., Advanced
Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues. , Advanced
Proficient in ethical hacking techniques., Proficient
Strong critical thinking ability and investigative/problem solving skills., Advanced

Licenses/Certifications
CISSP Certified Information Systems Security Professional Upon Hire Req or
CISM - Certified Information Security Manager Upon Hire Req or
Certified Ethical Hacker (CEH) Upon Hire Req or
Certified Information Systems Auditor (CISA) Upon Hire Req

Education

Any Graduate