We provide IT Staff Augmentation Services!

Cyberark Engineer Resume

3.00/5 (Submit Your Rating)

Phoenix, AZ

SUMMARY

  • 10 years of experience in IT field and strongly providing technical and security functions to Multi - tasking companies and organizations and assisting in Installation, configuration and management of CyberArk components (EPV, CPM, PSM, PSMP, PVWA, AIM, OPM & EPM) globally.
  • Well versed experience on versions CyberArk 8.x, 9.x and CyberArk 10.3 and 10.5.
  • Having Administration experience of CyberArk vault with Safe creation, integration with LDAP and other authentication methods.
  • Developed and maintain system security plans and contingency plans with the major applications.
  • Installation & configuration of CyberArk Vault, Password Vault Web Access (PVWA), Central Password Manager (CPM) and Privileged Session Manager (PSM) in Prod and DR.
  • Troubleshooting and maintenance of the Password Vault, Central Password Manager (CPM), Privileged Session Manager (PSM), Application Identity Manager (AIM), DR Vault in DR Server.
  • Good at understanding and communicate CyberArk's role in the privileged account security space.
  • Good knowledge in Active Directory and managing Users, Groups, Computers, Organizational Units.
  • Administration experience of CyberArk vault with Safe creation, integration with LDAP and other authentication methods.
  • Have good knowledge of network switches, routers, firewalls of market leading vendors and have functional knowledge of network protocols.
  • Migrate user accounts into Password Vault using Bulk upload utility.
  • Experienced in performing Privileged Access Reviews, Compliance Reporting, Access Control Processes and other associated tasks with Privileged User Management.
  • Configured v Switches, port groups and dv switches in vSphere 5/5.5 infrastructure.
  • Configured Storage and managed Data Stores.
  • Installed, configured and administered WINS, DHCP, IIS and WSFTP, File and Print servers.
  • Exposure to different types of testing like Automation testing, System testing, Functional testing, Regressiontesting, Integration testing, Smoke testing, Database testing, GUI testing and User Acceptance Testing.
  • Good analytical and communication skills and ability to perform designated tasks in timely manner.

TECHNICAL SKILLS

CyberArk Tools: Cyber-Ark PIM suite, Cyber Ark Privileged Identity Management

Databases: Oracle, MS SQL, DB2

Web Tech./Languages: Java, HTML, XML, Auto IT

Operating System: Window XP/2000, Window 7/8.1, Linux, UNIX, Word, Excel, Project, Power Point, Front page and Visio, Quality Center

PROFESSIONAL EXPERIENCE

Confidential, Phoenix, AZ

CyberArk Engineer

Responsibilities:

  • Installed and configured web-based applications.
  • Onboarded privilege accounts, generating reports from CyberArk for checking the productivity of the organization.
  • Provided access to users to put passwords in CyberArk through Private Ark and creating vaults.
  • Determine operational objectives by studying business functions, gathering information, evaluating output requirements and formats.
  • Generating reports from CyberArk for checking the productivity.
  • Define and implement security systems configuration, policies and hardening guidelines
  • Involved in implementation, migration and expansion of the company’s identity access management solution with the help of CyberArk PSM and Maintaining the User Keys.
  • Implementing and configuring CyberArk in the environment and did troubleshooting of various applications and vault servers.
  • Maintenance of technical documentation for CyberArk platforms and services
  • CyberArk Installation, Implementation and upgrade to latest versions 10.5, 10.8.
  • Token Handling and support security Analytics and customers with problem tickets and cases with issues
  • Installation and configuring CPM, PVWA, PSM and other CyberArk Components.
  • Identifying the interoperability requirements with Amex PAM systems.
  • Describe use cases to assign and rotate SSH keys.
  • Translate business requirements into technical specifications.
  • Onboarding the bulk amount of discovered SSH Keys into CyberArk by using Account Upload Utility
  • Troubleshooting the issues and maintaining Audit logs.

Confidential, San Jose, CA

Sr. CyberArk Consultant

Responsibilities:

  • Perform as the subject matter expert for information security technology, processes and practices internally to the plan provided by the client. Providing access to shared drives and administrating the inactivity of the internal users through Active Directory.
  • Privileged Access Management (PAM) project which includes implementing CyberArk Password Vault, Web Access, Central Password Manager and Privileged Session Management.
  • Upgradation of CyberArk from 9.1 to 9.8 in the process of slow migration
  • Installed and configured Enterprise Password Vault, Password Vault Web Access, Central Policy Manager and Privileged Session Manager in Prod and DR environments
  • Designed the safe structure for CyberArk authorization model
  • Creating and assigning Safes, reconciling accounts, rotating passwords.
  • Experience in supporting Microsoft Active Directory.
  • Experience with Privileged Identity/access Products, Cyberark, NetIQ Identity Manager and SecureAuth.
  • Troubleshooting applications and scripts by accessing and analyzing logs on Windows servers.
  • Good Experience with PVWA servers Managing Applications Credentials, Auto upload and User Access Policy Management.
  • Managing, monitoring and Supporting systems hardware, software, and applications.
  • Resolving CyberArk issues, majority of the issue are with CPM related to change password and reconciliation of credentials.
  • Coordinating efforts with vendors for upgrades and system maintenance.
  • Managed failed accounts synchronization and password rotations.

Confidential, Seattle, WA

CyberArk Consultant

Responsibilities:

  • Worked on CyberArk Enterprise Password Vault and PVWA.
  • Experienced in day to day operational support in adding and deleting accounts, applying policies, assigning safes, synchronizing failed accounts, Password rotations.
  • Managing, monitoring and Supporting systems hardware, software, and applications.
  • Resolved CyberArk issues in CPM communicate with host to reconcile credentials.
  • Conduct workshops with application and infrastructure teams about on-boarding privileged accounts.
  • On-board privileged accounts and application ids with CyberArk upload utility or PVWA.
  • Ensure ongoing CyberArk system Maintenance is scheduled and completed on time.
  • Creating a new application on board is documented and implemented.
  • Manage the day to day operations of CyberArk solutions including adding and deleting accts.
  • Managing policies and platforms.
  • Managing administration and operations of Cyber-Ark PIM.
  • Creating and assigning Safes, reconciling accounts, changing passwords.
  • Works with Unix / Directory Support and Network team.
  • Coordinate with CyberArk support teams for escalation and resolution issues
  • Involved in both Sever System analyze and Security support on CyberArk as well as Support on Security on Windows servers.
  • Responsible for creation of new users, groups and activate accounts in Active Directory (AD).
  • Performed PAM Operational Tasks Defining Access Control, User Entitlements, Manage Applications Credentials and User Access Policy Management.
  • Installation and Troubleshooting of Windows Server 2008 and 2012 R2.
  • Monitoring logs and troubleshooting issues with server and the environment.
  • Monitoring logs, analyzing logs and Troubleshooting issues with the server and the environment.
  • Customize CyberArk audit reports and generate audit reports time to time.

Confidential, Charlotte, NC

Jr. System Analyst

Responsibilities:

  • Worked on basic network administration tasks such as network connectivity troubleshooting, account management using Active Directory in a Windows OS environment.
  • Monitoring security patch levels of the servers, workstations and network environments, and anti-virus systems.
  • Identified issues on sessions management, Input validations, output encoding, Logging, Exceptions, Cookie attributes, encryption, Privilege escalations.
  • Installing and Configuring AD, DNS, DHCP.
  • Responsible for the assignment and configuration of IP addresses.
  • Perform analysis and produce documentation on logs produced by network devices such as firewalls, content filtering, and syslog from various sources/devices.
  • Explanation of the security requirements to the design team in initial stages of SDLC to minimize the efforts to rework on issues identified during Penetration tests.
  • Provides access rights and privileges as needed for all managed applications and ensures in compliance with management-based requirements.
  • Providing remediation to the developers based on the issues identified.

We'd love your feedback!