Ref ID: 00340-0012109770
Classification: Security Network Engineer
Our client is currently seeking an CyberArk Security Engineer. Candidate will be part of an Enterprise-wide Information Security Engineering team. Candidate will be a key member of a team responsible for planning, implementation and support of the Enterprise Privilege Vault Management System Platform. This position will be responsible for design, deployment, configuration and maintenance of CyberArk PIM Suite in a global environment.
Design, implement, integrate and administer Identity and Access Management (IAM) systems and solutions.
Monitor and maintain IAM systems, training and communication of IAM processes and advise on IAM solutions and best practices.
Facilitate the continuous adoption, training, communication and education of IAM capabilities, functions and standards.
Test and Implement Identity Policies using Conditional Access, CyberArk and other common identity solutions.
Assist in the operationalization of CyberArk EPM deployment including agent deployment, policy management and tuning, troubleshooting and documentation. Locate and evaluate software in various repositories for packaging, centralization, or deletion.
Create elevation policies with CyberArk EPM, using a best practice approach.
Automate common identity processes for operational support.
Design and implement operationally ready, best practices security solutions (tools and services) to mitigate security threats and risks that may impact the business. Areas of concentration include SIEM, firewall, WIDS, WAF, DLP, RMS, WAF, web proxy, vulnerability scanning and virus/malware management.
Work with vendors and internal teams as needed to ensure any outstanding issue is resolved in a timely manner.
Research and execute technology refresh according to product roadmap and industrial best practices.
Participate as Tier 3 technical security expert when coordination of incident response activities is required during each security incident response event.
Conduct technical assessments and research of computer-related security incidents, including malware analysis, fraud detection packet level analysis, and system-level forensic analysis to ensure the continuing development of security protection technology as it relates to defending and protecting RH and its customers.
Assess severity levels of security threats (e.g., incidents, vulnerabilities, malicious code) and coordinate the appropriate notifications or escalations in a timely manner to Director, Information Security.
Act as an escalation point to provide technical guidance to Security Operations when processing any complicated user requests.
Code/Customize the CyberArk product when needed and provide guidance.
Administer and engineer CyberArk for integrating privileged accounts for associates and services.