We provide IT Staff Augmentation Services!

Cyberark Engineer Resume

0/5 (Submit Your Rating)

SUMMARY

  • Experienced information security professional with over 7+ years of IT Experience and 4+ years of solid understanding of PAM, Enterprise Password Vault, Privileged Identity Management, Disaster Recovery, Multi Factor Authentication, LDAP, AD (creating security groups, creating users, assigning policies, maintaining password complexity rules), PSM, CPM, PVWA, PSM SSH Proxy (PSMP),Password Upload Utility
  • Platform, CPM logs, PSM logs, Vault logs, Event Notification, Firewall, SIEM Config File, Service Accounts, Account onboarding, UNIX, SSH keys, One Time Passwords, Check In Check Out, Dual Control, Custom Connector, LDAP Authentication.

PROFESSIONAL EXPERIENCE

CyberArk Engineer

Confidential

Responsibilities:

  • Primarily involved in Installation and configuration of CyberArk Vault, CPM, CyberArk PVWA, AIM, OPM CyberArk PSM and PSM SSH proxy Architecture and design.
  • Responsible for optimizing the existing security infrastructure of our client and assist the Security Practice Architect in selection, design, architecture, automation enhancement, and best practices in regard to the Privilege Access Management products.
  • Responsible for CPM configurations that supports remote password management and change on the following IIS Application Pools.
  • Provide administrative support for the Enterprise - wide IAM and the associated systems.
  • Involve in interacting with clients during meetings, gather requirements, design and deliver solutions to install and integrate with the existing Confidential insight implementations and manage high privileged accounts to automate privilege access management process.
  • Responsible for optimizing the existing security infrastructure of our client and assist the Security Practice Architect in selection, design, architecture, automation enhancement, and best practices in regard to the Privilege Access Management products.
  • Responsible for password policy creation, password rotations, account creation, account changes, account integrations, maintaining/creating new safes, and PAM policies.
  • Maintain resource on PAM/PIM implementation (CyberArk) - planned and configured environment for highly secured finance/HR accounts.
  • Developed and implemented processes and procedures for Onboarding users and Privilege Accounts to CyberArk.

Cloud security Engineer/ IAM Engineer

Confidential

Responsibilities:

  • Installation and configuration of CyberArk Private Ark client and Private Ark server and CPM, PVWA, PSM, PSMP, DR, good understanding of policies in CyberArk Central Policy Manager (CPM) and (PSM), Resolved CyberArk issues in CPM to communicate with a host to reconcile credentials
  • Implementing security best practices in AWS including multi factor authentication, access key rotation, encryption using KMS, firewalls- security groups and NACLs, S3 bucket policies and ACLs, mitigating DDOS attacks, etc.
  • Configuring S3 events to set up automated communication between S3 and other AWS services.
  • Controlling access to files and directories using ACL permissions.
  • Configuring and using AWS CLI to make API calls to AWS console.
  • Designing for high availability and business continuity using self-healing - based architectures, fail-over routing policies, multi-AZ deployment of EC2 instances, ELB health checks, Auto Scaling, and other disaster recovery models.
  • Using AWS Scheduler as a simple solution to create automatic start and stop schedules for Amazon EC2 and Amazon RDS instances for cost optimization.
  • Tagging AWS resources and developing a methodological standard for tagging of individual resources for audit, tracking and cost analysis.
  • Migrating on-premises databases to cloud via cloud endure.
  • Managing provisioning of AWS infrastructures using CloudFormation.
  • Developing a continuous delivery pipeline in a cloud environment.
  • Developing automation solutions utilizing Ansible, and CloudFormation.
  • Performing setup and maintaining AWS services in Development, Test, and Production environments.
  • Using AWS Control Tower to automate the setup of new landing zone using best practices blueprints for federated access, identity, and account structure. Developing and documenting security guardrails for AWS Cloud environments. Setting up CI/CD pipeline to run automated tests efficiently.

We'd love your feedback!