We provide IT Staff Augmentation Services!

Cyberark Engineer Resume

4.00/5 (Submit Your Rating)

Memphis, TN

SUMMARY

  • Over 7 years of experience in System Administration, Maintenance, Installation, Configuration, Trouble Shooting and Network Security, Privileged Access Management.
  • Implementing & Managing Master Policy, Directory Mapping, LDAP integration, Platform and Safe via Private Ark client & PVWA.
  • Installation and configuration ofCyberArkVault, Password Vault Web Access (PVWA), Endpoint Privilege Manager (EPM), Central Password Manager (CPM) and Privileged Session Manager (PSM) in Prod.
  • Troubleshooting and maintenance of the Password Vault, Central Password Manager (CPM), Privileged Session Manager (PSM), Application Identity Manager (AIM), DR Vault in DR Server.
  • Worked on Disaster Recovery Vault (DR) andCyberArkEnterprise vault.
  • Good at understanding and communicate CyberArk's role in the privileged account security space.
  • Developed and implemented processes and procedures for onboarding users and Privilege Accounts toCyberArk.
  • Extensive experience in implementation and deployment of Privileged Account Security solution for Windows, UNIX, Database servers, Security, Networks and Websites.
  • Integration of Event Notification Engine (ENE) & Service now ticketing system toCyberArkin PVWA.
  • On - boarding of Privilege Accounts to Cyber-Ark, Configured CyberArk to MySQL, Oracle databases.
  • Knowledge on implementation and monitoring of the EPM product.
  • Well experienced inCyberArkAdministration and troubleshooting
  • Good knowledge in Active Directory and managing Users, Groups, Computers, Organizational Units.
  • Have good knowledge of network switches, routers, firewalls of market leading vendors and have in-depth knowledge of network protocols.Experience in Linux and Windows systems to provision new ids and find the RCA in system level and troubleshooting. Good knowledge on Shell script and windows PowerShell.
  • Good analytical and communication skills and ability to work independently with minimal supervision and perform as part of a team.

TECHNICAL SKILLS

Primary Skills: CyberArk 8x, 9x, 10x

Programming: HTML, CCS, Java, SQL, PL/SQL, PACLI, PowerShell

Secondary Skills: Active Directory, LDAP

Web Technologies: HTML 5, XML, CSS, BOOTSTRAP.

Database: Oracle, MS SQL, DB2

Operating System: Windows, Linux/UNIX

Domain Knowledge: IAM, Implementation, Operation.

PROFESSIONAL EXPERIENCE

Confidential, Memphis, TN

CyberArk Engineer

Responsibilities:

  • Installed and configured web-based applications. Administration of CyberArksafes and creating of Vaults for the privileged users.
  • Onboarded privilege accounts, generating reports from CyberArk for checking the productivity of the organization.
  • Provided access to users to put passwords inCyberArkthrough Private Ark and creating vaults.
  • Determine operational objectives by studying business functions, gathering information, evaluating output requirements and formats.
  • Created policies with the CyberArk EPM Product.
  • Generating reports from CyberArk for checking the productivity.
  • Implementing and configuringCyberArk in the environment and did troubleshooting of various applications and vault servers.
  • Upgraded theCyberArkfrom version 9x to 10x via removing the clusters and making a standalone vault server.
  • Involved in information gathering and understanding existing system of the organization and creating solution blueprint for solution and creating approach to onboard privileged entities.
  • Wrote new enterprise control standards and policies for SSH keys.
  • Setup and configure Private Ark Command Line Interface (PACLI) to support windows and WebLogic applications.
  • Working on various PowerShell scripts for automating the process of group creating in active directory.
  • On-boarding of various privileged accounts onCyberArkand automating the process by running password upload utility scripts.
  • Implementing Application Identity Manager in the environment to onboard all the APP IDs for password rotation.
  • Implemented Privilege Session Manager in the environment to monitor the sessions of the domain users for better security.
  • Worked on Privilege Threat Analytics and designing Application Identity Management scope for on boarding various applications toCyberArkfor password management.
  • Generate DNA report from CyberArkand setting up of the Service accounts and Local Accounts in the server for compliance. Creating shared drives and drive mapping for the users through active directory.
  • Experience in integrating Splunk withCyberArkfor monitoring purpose along with SIEM monitoring.
  • Experience in implementing MS SQL Management Studio and TOAD for SQL Studio monitoring via AD windows authentication.

Confidential, St. Louis, MO

CyberArk Engineer

Responsibilities:

  • Perform as the subject matter expert for information security technology, processes and practices internally to the plan provided by the client. Providing access to shared drives and administrating the inactivity of the internal users through Active Directory.
  • Privileged Access Management (PAM) project which includes implementing CyberArk Password Vault, Web Access, Central Password Manager and Privileged Session Management.
  • Worked on EPM tools for improved operational efficiencies through an automated workflow approval and provisioning engine that integrates authorization and authentication.
  • Experience in CyberArk Privileged Account Security product suite - Enterprise, Password Vault, Password Vault Web Access, Central Policy Manager, Privileged.
  • Manage the day to day operations of CyberArk solutions including adding and deleting accts.
  • Managing policies and platforms.
  • Creating and assigning Safes, reconciling accounts, rotating passwords.
  • Create AD users and groups for safe delegation and updates.
  • Conduct workshops with application and infrastructure teams about on-boarding privileged accounts.
  • Assist application teams with CyberArk application Identity Manager integrations and linked accounts.
  • On-board privileged accounts and application ids with CyberArk upload utility or PVWA
  • Ensure ongoing CyberArk system Maintenance is scheduled and completed on time.
  • Creating a new application on board is documented and implemented.
  • Works with Unix / Directory Support and Network team
  • Perform application and Job designs with the existing and current requirements.
  • Design build and support processes on Windows Servers and Cyber Ark Security Platform. Providing support to Server owners on the security Servers.
  • Coordinate with CyberArk support teams for escalation and resolution issues
  • Ensure that all Identity and access management (IAM) services are secure, available, efficient and meet defined corporate services levels
  • Co-ordination with the offshore support teams to address technical or business requirements related queries.
  • Involved in both Sever System analyze and Security support on CyberArk as well as Support on Security on Windows servers.
  • Monitoring logs, analyzing logs and Troubleshooting issues with the server and the environment.
  • Documenting the patterns for new configurations.

Confidential, Dallas, TX

CyberArk Administrator

Responsibilities:

  • Worked on Privileged Account Management with CyberArk PIM suite Administration.
  • Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
  • Configured platforms, master policies, created Safes & On-Boarded 1000's of Privileged Accounts, connection components, transparent components, access control through AD Group Nesting's
  • Daily administration and maintenance of company's E-Directory
  • Creation of policies and reports in PVWA.
  • Administration experience of CyberArk vault with Safe creation, integration with LDAP and other authentication methods.
  • Integrated with Active Directory (LDAP), 2 Factor Authentication (RADIUS).
  • Involved in application to application credential management.
  • Defined user account settings through Active Directory and used Active Directory to create, modify, and manage user, computers, and group account.
  • Experience in performing Privileged Account Management with fair understanding the underlying business processes.
  • Responsible for determining the target Privileged Session Management (PSM) audience. Determine what infrastructure and systems PSM will target (servers, virtual servers, database)
  • Performed internal configuration of PSM to the vault itself
  • Installed, configured disaster recovery Vaults and DR services
  • Maintain development, testing, and production systems. Coordinate maintenance with support teams
  • Perform Penetration testing and vulnerability assessment to improve application security.

Confidential, Austin, TX

System Admin

Responsibilities:

  • Assisted Information security officer for various IT audits and functions.
  • Software compliance using asset management software.
  • Installing Patches and keeping computer up to date.
  • Monitored external security resources to identify potential or existing threats and vulnerabilities to the company's information systems. Conveys alerts to appropriate technical personnel.
  • Worked on fixing the issues as per the SLA, priority of the tickets and routing them to other teams as required.
  • Developed and delivered regular reports to management describing the state and status of existing threats, vulnerabilities, mitigation strategies, and other information security metrics.
  • Responsible for maintaining the critical server's data backups.
  • Installed Oracle 8i and MS SQL in an enterprise network.
  • Provided system administration and help desk support to include software and hardware installations, maintenance, upgrades, troubleshooting, user account administration, and support under stringent deadlines in a fast-paced, 24X7 environment.
  • Software implementation and ongoing support. Communicated with vendors to ensure all issues were quickly resolved to maintain optimal system performance.
  • Assigning access permissions (share/security) for user.
  • Assigning admin rights, group memberships, resetting account lockouts. Job responsibilities include Hands-on solving of day-to-day operational issues, resolution of technical issues as they relate to system integration and support. Additional software package installation and updates on the system.

Confidential

System Admin

Responsibilities:

  • Implemented the application of standard operating procedures and systems security in support of the organization's IT architecture and business needs.
  • Configured, managed & maintained Windows, Linux systems (Windows 2008, RHEL, Centos), Active Directory, LDA.
  • Analyzed and mitigated security related threats. Monitored and assessed traffic & running reports.
  • Provided post-implementation Network management, maintenance and support services, specifically on Cisco Switches and Routers.
  • Planned and documented the process and the New Servers Builds in the environment.
  • Provided 24x7 System Administration support for Red Hat Linux 3.x, 4.x servers and resolved trouble tickets on shift rotation basis.
  • Provide the support of building the server, patching, user administration tasks, deployment, software installation, performance tuning and troubleshooting.
  • Monitoring system performance, tune-up kernel parameter, adding /removing /administering hosts, users, disks on DNS / NIS domain.
  • Configuration of Hardware and Software RAID on Digital & Sun Servers
  • Installed and Configured Send Mail Utility on UNIX Servers. Administering NFS Mounts.
  • Analyzed technologies, recommended vendors to address specific threat vectors such as Disk and Data encryption against physical theft and improper access, anti-malware to protect against malicious software and providing deep network control.
  • Evaluated and recommended the implementation of and dissemination of IT security tools, procedures and practices to protect information assets.
  • Responsible for setting up Web Application Firewalls (WAF) like SQL injection, http conversation.
  • Configured VLAN, spanning tree, VSTP, SNMP on Juniper EX series switches, checkpoint firewall layers securing existing Data Center infrastructure.
  • Responsible for the Windows environment, including backup, disaster recovery and network Security.

We'd love your feedback!