Privilege Access Management
As a Lead PAM Security Engineer, I partner with product owners, tech leads, engineers, and delivery professionals to improve client’s Privileged Access Management solutions. An important part of my work function is to ensure that the PAM solution (CyberArk) remain in compliance with the Information Security Standards and processes. I bring excellent problem solving, communication and teamwork skills, along with agile ways of working, strong business insight, an inclusive leadership attitude and a continuous learning focus.
- Contribute to PAM Security Strategy, including provisioning, password management and access policies, SSH key management, API key management, and reporting.
- Authoring and maintaining documentation procedures, inventories, and diagrams for PAM systems and processes.
- install and configure the Privileged Access Management (PAM) solution securely following Best Practices.
- Define and describe the CyberArk Privileged Account Security system architecture, requirements, and workflow processes.
- Secure and install Password Vault Web Access (PVWA) Central Policy Manager (CPM) and Privileged Session Manager (PSM) in a distributed or Load Balanced configuration.
- Integrate with external services, e.g., LDAP/S, NTP, SMTP, SYSLOG.
- Configure authentication mechanisms including multi-factor authentication using CyberArk, RADIUS, LDAP/S, PKI, Windows.
Identity & Access management
Lead team of Analysts and Engineers Identify and manage IAM architectural issues of various platforms, applications, and systems, to plan and work on a problem resolution according to standardized processes. Serve as a technical subject matter expert and a key influence maker for IAM as it relates to cloud security, network security, and other platforms related to security efforts. Research and translate risk information on ICAM capabilities to support DOD 2027 ZTA mandates. Make recommendations from identified capability gaps to increase cybersecurity, improve daily operations, and gain IT efficiencies.
- Design and build a robust employee identity architecture that ensures the right access, for the right individuals, at the right time by implementing self-service platforms that automate the request, approval, provisioning, and verification processes of access.
- Demonstrate experience in end-to-end deployment of OKTA solution. Experience with OKTA planning, implementation, and operations. Analyze, design, develop, implement, and support Okta integrations for various business functions.
- Partner with fellow security architects to understand the broad scope of identity and access challenges within the company and provide solution guidance that aligns with the overall IAM strategy.
- Design and implement reliable, scalable, high-performing Identity and Access Management (IAM) products and solutions that meets the program’s governance, policies, standards, procedures, and processes.
- Lead and develop solution designs, roadmaps, and system transition plans to align projects, business, application, data, and integration, and/or infrastructure architecture.
- Implement, execute, and support critical IAM processes, including overall identity management, access management, provisioning/de-provisioning, user onboarding/offboarding, and access certifications/review.
Cloud Application Security Broker
Coming soon…
Vulnerability Management
Coming soon…
Security Operations
Coming soon…