Identity & Access Management - CyberArk Associate - Operate
Hyderabad - My Home Twitza, India
PwC
We are a community of solvers combining human ingenuity, experience and technology innovation to help organisations build trust and deliver sustained outcomes.Line of Service
AdvisoryIndustry/Sector
Not ApplicableSpecialism
Managed ServicesManagement Level
AssociateJob Description & Summary
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data.In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks.
Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities.
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
CyberArk Operations A JD:
REQUIRED EXPERIENCE:- 2-4 years of experience in operations of Privileged Identity Management using CyberArk solution for large scale customers across various industry verticals
-Experience on Onboarding Windows, UNIX, Mainframe, Database, AWS/Azure and User identity management.
-CyberArk CDE/Sentry Certified.
Certification- CDE/Sentry(mandatory)
Roles and Responsibilities:-
Strong knowledge of CyberArk solutions, including PAM, PAS, Cloud and other related modules(PTA, EPM, Alero, etc).
Strong understanding of architecture - IAM solutions within Microsoft Azure, Amazon Web Services (AWS) and, preferably, other cloud providers.
Experience in system administration and operations of CyberArk solutions.
Assisting in the identification, investigation, and resolution of security incidents related to privileged access. This may involve analyzing logs, conducting investigations, and implementing remediation measures.
Managing access to Windows, Unix/Linux, Web portals, and RDP Published applications.
Managing user access to privileged accounts and credentials, ensuring appropriate access levels and permissions are granted based on business requirements and security policies.
Providing technical support and troubleshooting assistance to end-users and stakeholders, resolving issues related to CyberArk solutions and privileged access management.
Creating and maintaining documentation, including standard operating procedures, user guides, and knowledge base articles. Assisting in the development and delivery of training programs to educate users on CyberArk solutions and best practices.
Identifying areas for improvement in the organization's privileged access management processes and suggesting enhancements to optimize system performance and security.
Understanding of use Account, Service, and task Discovery tools
Target system On-boarding and Application on-boarding.
Serve as the subject matter expert (SME) for the CyberArk PAM toolset.
Provide overall direction and oversight into the PAM functions across the organization, including Password Vaulting of elevated user and application service accounts.
Well versed with automation scripts in Rest-API
Knowledge on customization of CyberArk Platforms, Connectors/Plugins (with AutoIT/Shell Scripting) and good knowledge on auto-detection configuration and usage of Discovery Scanning tools.
Candidates who have strong knowledge on other PAM/PIM tools like Thycotic, BeyondTrust Power Broker tools are also preferred.
Must be flexible to work in a 24/7 operational environment
Education (if blank, degree and/or field of study not specified)
Degrees/Field of Study required:Degrees/Field of Study preferred:Certifications (if blank, certifications not specified)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Communication, Cybersecurity Framework, Cybersecurity Governance, Cybersecurity Risk Management, Cybersecurity Strategy, Cyber Security Threat Mitigation, Cyber Threat Intelligence, Digital Forensics, Emotional Regulation, Empathy, Firewall (Network Security), Forensic Investigation, Incident Management, Incident Remediation, Incident Response Plan, Inclusion, Intellectual Curiosity, Log Analysis, Mitigation Measures, Network Forensics, Network Infrastructure, Network Security Platforms {+ 10 more}Desired Languages (If blank, desired languages not specified)
Travel Requirements
Not SpecifiedAvailable for Work Visa Sponsorship?
NoGovernment Clearance Required?
NoJob Posting End Date
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APIs Automation AWS Azure Clearance Clearance Required Cloud Cyberark Firewalls Forensics Governance IAM Incident response Linux Log analysis Mainframe Network security Risk management Scripting Strategy Threat intelligence UNIX Vulnerabilities Windows
Perks/benefits: Career development Flex hours
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.