Washington, DC, USA
3 days ago
Cyber Security Engineer, CyberArk

Job Title: Cyber Security Engineer, CyberArk 
Role Type: Contract 6 + months
Location: Remote EST
Great opportunity to work for enterprise Healthcare company!

PURPOSE: Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems. Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures. Perform activities from Installing and Setting up CyberArk to customizing/configuring it for Governance Policies and procedures identified during implementation of the Privilege Identity Management (PIM) system and its production support. Includes onboarding of privileged User IDs into CyberArk from Active Directory, UNIX, Linux, Windows, and zOS/RACF systems. Assist in and perform the day-day activities related to CyberArk including the development, testing and roll-out phase activities of the implementation and support. Must be someone who has performed CyberArk PIM implementations before and knows the best solutions for the issues faced normally throughout such projects. Manage and administer the safes, policies, and custom components of CyberArk application. Knowledge in implementing and supporting Application Identity Management (AIM). Develop and manage delivered integrations with CyberArk and other applications like TOAD, SQL Server Management Studio and VMware Horizon Client. Provide guidance during the enhancements of the PIM solution. Code/Customize the CyberArk product when needed and provide guidance and understanding of the consequences. Provide documentation of all steps followed and all the activities within those steps during the Implementation to FEPOC. Should be someone who has performed multiple PIM Implementations at large organizations using CyberArk. Requirements:
Qualifications
Ability to perform risk assessments and investigate cyber security incidents.
Ability to understand vulnerabilities at a technical level.
Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues.
Proficient in ethical hacking techniques.
Strong critical thinking ability and investigative/problem solving skills.

Experience:
6-8+ years relevant IT security experience
Experienced with Privileged Identity Management (PIM)
Skilled with security patching, upgrades, updating passwords
Experience in Scripting
Skilled in the development of plug-ins

Education Level: Bachelor's Degree
Education Details: Computer Science, Information Technology, or related field


In Lieu of Education
In lieu of a Bachelor's degree, an additional 4 years of relevant work experience is required in addition to the required work experience.


Licenses/Certifications – preferred not required
CISSP Certified Information Systems Security Professional
CISM - Certified Information Security Manager
Certified Ethical Hacker (CEH)
Certified Information Systems Auditor (CISA)
 

System One, and its subsidiaries including Joulé, ALTA IT Services, CM Access, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.


System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.


Confirm your E-mail: Send Email