Educational qualifications
Graduation degree in any stream or equivalent / post-graduation degree/diploma Certification in any IAM product would be an added advantage.
Work experience
We are looking for a of IAM resource with 5 years of experience for one of our engagements. The resource must work from our Pune/Bangalore office and willing to work on shifts
The ideal candidate will:
At least 60 months of Privileged Access Management domain experience with expertise in CyberArk Privilege Cloud Data Protection Advisor (DPA) and Secure Configuration Assessment (SCA) administration.
A quick learner and adaptable to changing environments
Have strong analytical skills and communication skills
Build strong professional working relationships with client personnel
Clear understanding of IAM solution design and configuration
Working in rotational shifts supporting client environment.
Deliver timely and high-quality work diligently
Identify issues and opportunities and communicate them to appropriate senior member
Mandatory Certification Required:
CyberArk CDE Certification
Technical Skills Required:
At least 60 months of experience in CyberArk-PAM product
CyberArk Privilege Cloud Administration:
Act as a secondary administrator for CyberArk Privilege Cloud contributing to the deployment configuration and maintenance of the solution.
Assist in managing privileged accounts credential rotation session management and audit trails as per organizational policies.
Support monitoring and troubleshooting of CyberArk Privilege Cloud performance and issues ensuring reliable and secure operations.
Credential Management:
Vaulting: Storing privileged credentials securely in a centralized vault with strong encryption
Automated Password Rotation: Regularly rotating passwords to reduce the risk of credential exposure
Access Control:
Just-in-Time (JIT) Access: Granting temporary privileged access to users only when needed reducing the risk of prolonged exposure
Zero Standing Privilege: Advocate and deliver the removal of all persistent privileges for users within BSC.
Monitoring and Auditing:
Session Monitoring: Recording and monitoring privileged sessions to detect and respond to suspicious activities
Audit Logs: Maintaining detailed logs of all privileged access activities for compliance and forensic analysis