CrawlJobs Logo
Briefcase Icon
Category Icon

Filters

×

IAM Consultant CyberArk Jobs

6 Job Offers

Filters
New
Global IT Security Expert - IAM
Save Icon
Location Icon
Location
India , Pune
Salary Icon
Salary
Not provided
https://www.randstad.com Logo
Randstad
Expiration Date
Until further notice
Read More
Arrow Right
Pam Engineer
Save Icon
Location Icon
Location
India , Bangalore
Salary Icon
Salary
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Read More
Arrow Right
Pam Senior Engineer
Save Icon
Location Icon
Location
India , Bangalore
Salary Icon
Salary
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Read More
Arrow Right
Identity and Access Management (IAM) Consultant
Save Icon
Location Icon
Location
Spain , Madrid
Salary Icon
Salary
Not provided
https://www.inetum.com Logo
Inetum
Expiration Date
Until further notice
Read More
Arrow Right
Service Delivery Manager - Managed Security
Save Icon
Location Icon
Location
India , Bangalore
Salary Icon
Salary
Not provided
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Read More
Arrow Right
IAM Consultant CyberArk
Save Icon
Location Icon
Location
Luxembourg , Leudelange
Salary Icon
Salary
Not provided
https://www.soprasteria.com Logo
Sopra Steria
Expiration Date
Until further notice
Read More
Arrow Right
Explore the dynamic world of IAM Consultant CyberArk jobs, a critical and high-demand career path at the intersection of cybersecurity and identity management. An IAM (Identity and Access Management) Consultant specializing in CyberArk is a security professional focused on protecting an organization's most critical assets by securing privileged accounts. These are the powerful administrative, service, and application accounts that, if compromised, could lead to catastrophic data breaches. This role is not just about implementing a tool; it's about designing and managing a robust security framework that governs and monitors all privileged access within an enterprise. Professionals in these jobs are typically responsible for the end-to-end lifecycle of a Privileged Access Management (PAM) program using the CyberArk suite. Their common day-to-day duties involve designing and architecting secure PAM solutions tailored to complex IT environments. They are tasked with the installation, configuration, and integration of the core CyberArk components, such as the Enterprise Password Vault (EPV), Central Policy Manager (CPM), Password Vault Web Access (PVWA), and Privileged Session Manager (PSM). A significant part of their role includes creating and managing Safes, defining access control policies, and setting up automated password rotation for thousands of privileged accounts across Windows, Linux, network devices, and databases. Furthermore, they implement and fine-tune security protocols like CyberArk's Privileged Threat Analytics (PTA) for real-time monitoring and anomaly detection, responding to security alerts and conducting forensic analysis on privileged session recordings. To excel in IAM Consultant CyberArk jobs, individuals must possess a deep, hands-on understanding of CyberArk's architecture and core functionalities. Typical requirements include proven experience in deploying and maintaining PAM solutions, with a strong preference for CyberArk expertise. A background in system administration (Windows/Linux) or network engineering is highly beneficial for understanding the accounts being secured. Key skills include the ability to troubleshoot complex technical issues, script (e.g., PowerShell) for automation, and a thorough knowledge of security concepts like least privilege, zero trust, and compliance standards such as GDPR, SOX, or ISO 27001. While not always mandatory, professional certifications like CyberArk Certified Delivery Engineer (CDE) or CyberArk Sentry are highly valued and often considered a significant advantage, validating practical skills to potential employers. Ultimately, success in this profession hinges on a rigorous, analytical mindset, excellent problem-solving abilities, and the capacity to communicate complex security concepts to both technical teams and business stakeholders, making these jobs both challenging and immensely rewarding for cybersecurity experts.

Filters

×
Countries
Category
Location
Work Mode
Salary