CyberArk L3 || Remote || 10+ years at Tuscaloosa, Alabama, USA |
Email: [email protected] |
Greetings from ICONIC Infosys Inc!! ICONIC Infosys Inc is an IT Development & IT Staffing firm with more than a decade of experience in providing IT Staffing Solutions & Services. Our expertise is in sourcing and deploying highly skilled IT Specialists into mainstream and niche technologies to meet clients Temporary, Permanent & SOW project needs. Role: CyberArk L3 Location: Remote Duration: Long term Visa- Only USC Job Description: CyberArk Certified Delivery Engineer is must. CyberArk SaaS Certified Professional preferred. Migration experience from CyberArk On-Premises to CyberArk SaaS is preferred. 8+ years of overall IT experience PowerShell Scripting, Ansible, Salt Automation required. 3+ years of experience in deployment & implementation of Privileged Identity Management using CyberArk solution for large scale customers. Requirements analysis, strategy, design, implementation, and migration for businesses Supervision and development of staff on multiple projects, business development, and communications with executives Demonstrates extensive abilities and/or a proven record of success utilizing the following when managing and producing deliverables for client engagements related to managing successful enterprise scale implementations within Information Security utilizing the Privileged Identity Management suite of products specifically design and implementation of CyberArk. Responsible for Solution Design, Tool Implementation, privileged User account administration of various Windows and UNIX accounts using CyberArk components. Integrating various platforms with Cyber-Ark, such as Windows servers, UNIX servers, Databases and networking Devices. Creating and Managing Safes, platforms and Owners. CPM policies management or redistribution. Implementing the Password Upload Utility Knowledge on CPM and PSM connector customization Perform health check monitoring on all CyberArk severs to ensure consistent availability of system to end user. Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities. Best Regards , Sai Krishna Technical Recruiter Email: [email protected] www.iconicinfosys.com -- To post to this group, send email to [email protected]. Keywords: information technology |
[email protected] View all |
Fri Feb 09 19:53:00 UTC 2024 |