Required Skills

CyberArk Defender CyberArk Sentry CISSP CISM

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 11th Sep 2025

JOB DETAIL

•    Facilitate the integration of CyberArk solutions with IT infrastructure, applications, and cloud environments.
•    Administration and Maintenance: 
•    Oversee the ongoing administration, maintenance, and optimization of CyberArk environments.
•    Ensure regular updates, patches, and upgrades are applied to CyberArk systems to maintain security and performance.
•    Develop and implement backup and recovery strategies for CyberArk components.
•    Security and Compliance: 
•    Ensure CyberArk implementations comply with internal security policies, standards, and regulatory requirements.
•    Implement and enforce least privilege access principles and secure privileged account management practices.
•    Endpoint Privilege Management (EPM): 
•    Work with the integrator to deploy and configure CyberArk EPM to manage and secure endpoint privileges.
•    Develop policies and controls to minimize risks associated with endpoint privilege escalation.
•    Monitor and analyze endpoint activities to detect and respond to potential security threats.
•    Secure Cloud Access (SCA): 
•    Collaborate with the integrator to implement CyberArk SCA to secure privileged access to cloud environments (AWS, Azure, GCP).
•    Ensure SCA integration with cloud-native security tools and services to enhance cloud security posture.
•    Monitor and manage secure access controls to cloud resources, ensuring compliance with security best practices.
•    Incident Management and Support: 
•    Provide technical support and troubleshooting for CyberArk-related issues in collaboration with the integrator.
•    Respond to and investigate security incidents involving privileged access and endpoint activities.
•    Collaborate with the security operations center (SOC) and other IT teams to resolve incidents and improve security posture.
•    Documentation and Training: 
•    Develop and maintain comprehensive documentation for CyberArk configurations, processes, and procedures.
•    Provide training and support to IT staff and end-users on CyberArk usage and best practices.
•    Stay current with the latest CyberArk features, updates, and security trends.

Company Information