Title: Information Security Specialist (CyberArk)
Location: Remote
Duration: 12+ months
Position Description:
- An Information Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements.
- The Information Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability.
- The Information Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents.
Skills Required:
- The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.
Skills Preferred:
- Proficient with CyberArk Endpoint Privilege Manager and CyberArk EPM.
- Knowledge of EPM policies, configurations, and deployment.
- Understanding of CyberArk architecture and components.
- Ability to design, deploy, and manage CyberArk EPM solutions.
- Expertise in creating, managing, and enforcing least privilege policies.
- Proficient in Loosely Connection Device onboarding and troubleshooting connection and password rotation issues.
- Understanding of application control and privilege management.
- Strong technical skills in defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution.
- Strong technical skills with installation, integration, and deployment of CyberArk Endpoint Privilege Management agent
- Possess strong troubleshooting skills to diagnose and resolve issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments.
- Understanding and familiarity with Operating Systems (Unix, Linux, Windows), Network devices, and databases (SQL, Oracle, etc.)
- Proficient in managing and securing various operating systems, including Windows, Linux, and Unix-based systems,
- A strong understanding of security concepts, including protection, detection and response (EDR), and endpoint compliance.
- Possess practical communication skills to interact with stakeholders, team members, and vendors and collaborate on security initiatives, incident response efforts, and knowledge sharing.
- Familiarity with programming language, preferably Python and PowerShell script.
- Strong analytical and problem-solving skills and ability to troubleshoot and resolve complex issues.
- Excellent written and verbal communication skills and ability to explain technical concepts to non-technical stakeholders.
- Strong organizational and time management skills.
Experience Required:
- This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation.
- At least three (3) years of that experience must be in information security analysis.
Experience Preferred:
- 5+ Experience with overall CyberArk architecture, components, and interdependencies like CyberArk’s Vault, including installation, configuration, and maintenance.
- 5+ years of experience with installation, integration, and deployment of CyberArk Endpoint Privilege Management
- 5+ years of experience with onboarding and implementing the Loosely Connection Device feature within the CyberArk EPM solution.
- 5+ years of experience defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution.
- 5+ years of experience troubleshooting, diagnosing, and resolving issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments.
- 5+ years of experience implementing the Just in Time feature within the CyberArk EPM solution.
- 5+ years of experience managing and securing various operating systems, including Windows, Linux, and Unix-based.
- 5+ years of experience with CyberArk Privileged Access Management routine tasks- Access control, User entitlements, password policy, etc.
- 5+ years of experience integrating CyberArk solutions with other security tooling, including IAM endpoint management logging, ticketing system, multi-tenant environment, and software distribution tool.
- 5+ years of experience with CyberArk EPM global policy standards and agent package deployments
- 5+ years of experience with scripting skills (e.g., PowerShell, Bash) to automate routine tasks, streamline processes, and integrate CyberArk EPM with other security tools and platforms.
- 5+ years of experience with cloud infrastructure platforms like AWS/Azure integration with CyberArk.
- 5+ years of understanding of SSO (OAuth, OpenID, SAML, etc.)
- 5+ years’ experience leading or contributing to cybersecurity projects, especially those involving endpoint protection and privilege management solutions.
Education Required:
- This classification requires the possession of a bachelor’s degree in an IT-related or Engineering field.
- Additional qualifying experience may be substituted for the required education on a year-for-year basis.
Verbal communication Troubleshooting Analytical skills Python Problem-solving Databases RBAC time-management Endpoint Detection and Response (EDR) remote work Communication single-sign-on penetration-testing Written communication skills Organizational skills operating-systems