Job Title:
Cyber Ark Administrator

Company: Dunhill Professional Search

Location: Fort Belvoir, VA

Created: 2024-04-20

Job Type: Full Time

Job Description:

Overview:The primary responsibilities include design, deployment, integration, administration, and daily operations of CyberArk Privileged Access System and password vault. Works closely with IT system administrators and application owners to support and enhance the existing Privilege Access Management (PAM) program. Qualified candidate should have proven experience in CyberArk Privileged Access Solution technologies.Qualifications:US Citizen with a Bachelor's degree in business administration, Management Information Systems, Computer Science, or closely related field is required.3-5+ years of experience in Identity and Access Management with a focus on Privilege Access Management (PAM) and CyberArk technologiesActive Secret Clearance CompTIA Security +3-5 years experience: CyberArk Defender, CyberArk SentrySecurity-related certification preferred (CISSP, CISA, CISM)Experience with AWS and AzureExperience with Active DirectoryExperience with Unix, Linux, and WindowsPowerShell scripting preferred.Knowledgeable of federation / single sign on (SSO) and multi-factor authentication (MFA) preferred.Hands-on, results-oriented individual with a passion for winning and requiring minimal guidance.Ability to take ownership of multiple projects, shifting priorities, and changing environments and landscapes.Excellent verbal and written communication skillsResponsibilities:Leads analysis of current state of the PAM program technological environment.Recommend solutions for incremental improvements to PAM program.Privilege Access Management reporting and metricsWork closely with the Identity Access Management team, Infrastructure teams, application owners, and product managers to help drive technical adoption across organization.Work with vendors and third parties to evaluate new products, features, and solutions.Ensure regulatory requirements and industry best practices are followed for Identity and Access ManagementSupport large, cross functional, globally distributed, and complex projects.Provide evidence for audit and compliance activities.On call support of the identity and access management technologiesRemain current with security technology and trends for identity and access management in manufacturing, ecommerce, and retail.Develop relationships to promote security awareness and PAM program best practices.#cjpost