Description

Years of Experience

•             8+ years of relevant experience in CyberArk Implementation - Design & Architecture.

General Description

•             Creating and implementing strategies for managing privileged access, designing solutions, and ensuring the secure storage and retrieval of sensitive credentials.

•             Demonstrating in-depth knowledge of CyberArk products, including the Enterprise Password Vault, Privileged Session Manager, and other related tools.

Skills / Technical Requirements

•             Expertise in providing PAM solutions using CyberArk.

•             Should have experience on CyberArk from 11.xx onwards

•             Design deploy & support high-performance, high-availability PAM environment with any number of target end points, creating workflows, custom connectors, policies.

•             Perform enhancement in CyberArk Core PAS

•             On-board target systems onto CyberArk Core PAS.

•             Support migration from Centrify to CyberArk Core PAS.

•             Integrate Legacy IDM instances with CyberArk to manage human accounts.

•             Support Redhat migration

•             Migrate CyberArk shared and pooled accounts.

•             Create named tiered accounts model and onboard name tiered accounts in CyberArk and assign them to correct IDM User Groups

•             Work on Migration model - Pooled Accounts to Named tiered account.

•             Perform Centrify Access Data Analysis to yield the current access data model and merge into the new Tiered Access Model.

•             Should be capable to deploy/install/configure CyberArk components Vault, CPM, PVWA, PSM, PSMP and AIM as per the client requirements.

•             Hands-on experience or knowledge on Configuring PTA, EPM.

•             Integrating various platforms with CyberArk such as Windows, UNIX, Databases and network devices, SSH Keys, SAP etc.

•             Strong scripting skills, often using languages like PowerShell, Python, or Shell scripting, to automate tasks and customize CyberArk solutions.

•             Knowledge of regulatory requirements and industry standards related to privileged access management, such as NIST, CIS, and GDPR.

•             Experience with security monitoring tools and integrating CyberArk with Security Information and Event Management (SIEM) systems


 

Education

Any Graduate