Previous Job
Previous
CyberArk PAM Tech Analyst
Ref No.: 23-00590
Location: Iselin, New Jersey
Requirements:

Strong technical skills, excellent communications and critical thinking skills, and the ability to engage and interact with global teams.
Experience and expertise in CyberArk PAM solution
Taking on and further developing/deploying of our client's Privileged Access Management solution based on CyberArk technology.
Ability to work with the internal Project team and end customer to continue design and deployment activities and further enhance the PAM solution
Documentation skills
Security Policy and Governance experience and appreciation
Identity & Access Management/IDAM experience and knowledge
Design-level and hands-on skills with the following technologies:
CyberArk Privileged Access Suite
Secure Password Vault and Safes
Central Policy Manager
Privileged Session Manager
Deep Security knowledge spanning infrastructure, network, identity management and application security practices
Work as part of our Access Control team within the Security IAM (Identity & Access Management) Engineering organization to design and deliver automated identity and governance solutions across multiple security systems indifferent technology to ensure compliance processes run smoothly.
Design & deliver solutions for complex access requests, ensuring our lifecycle management products cater appropriately for new and existing entitlement types in an automated and efficient manner, as per security policy.
Work as part of our Compliance & Access Control team to assist with audits of entitlements, appropriateness of access and Quarterly Access Reviews, as defined by our Identity & Access Management Policies.
Assist with audit & compliance reviews, evidence collection and pre-certification testing, ensuring timelines are met for Compliance Certifications (e.g. SOX, SOC, SOC2) at the required cadence.
Partner with the GRC (Governance Risk & Compliance) team and internal & external auditors, to ensure all new automation, controls and processes are reviewed for accuracy and appropriateness.
Partner with various business units to assist in their onboarding to Identity Governance tooling and automation, as built by the Access Control & Security IAM Engineering teams.

Required Skills/Experience:

BS/BEng/BTech degree, or equivalent work experience.
Experience and expertise in CyberArk PAM solution
Experience with Linux, Windows, GIThub, Cloud scale Identity, Access Management (Single Sign-On/Multi Factor Authentication), Authorization services or design and architecture of IAM services
Knowledge of authentication platforms: Kerberos, LDAP, Radius, AD.
Federation platforms/protocols: Oauth, OpenID, SAML, WS-Fed, etc.
Working experience with commercial/enterprise IAM platforms: Ping Identity, Active Directory or Open Source: OpenLDAP, OpenDJ.
Experience in consumption of Web Service APIs: JSON / XML.
Experience of the Salesforce Platform.
Automated Testing - Writing functional and regression test cases. Selenium exp or similar
Excellent analytical, conceptual, problem-solving skills in addition to excellent attention to detail.
Self-starting, proactive and organized, as well as being capable of long-term thinking.
Passion for scaling systems and software, reducing manual activities, and a growth mindset.
Knowledge of Compliance Certifications (SOX, SOC, SOC2)
Strong technical understanding of systems, networking and identity fundamental
In-depth knowledge of:
Source Control Systems (Git, Gitlab, SVN, or similar)
Software branching strategies and trunk-based development
Created build/test/deploy pipelines
Fluent in one or more scripting or object-oriented languages
Understands object-oriented software design
Worked in a test-driven development (TDD) environment with a quality mindset

Preferred Skills/Experience
Understanding of cloud-native or microservice architecture
Worked with globally-distributed teams across time zones
Worked in a large enterprise with a history of influencing change across many stakeholders
Worked in an Agile software development environment
Understanding of a Secure Software Development Lifecycle