Privilege Access Management Operation Support (Remote) at HonorVet Technologies #vacancy #remote

Title: Information Security Specialist (CyberArk)

Location: Remote

Duration: 12+ months

Position Description:

  • An Information Security Specialist interprets information security policies, standards and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements.
  • The Information Security Specialist redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability.
  • The Information Security Specialist will provide highly specialized experience in one or more information, computer, or network security disciplines (e.g. penetration testing, accreditation, or risk assessment and mitigation); develop system security plans, certification and accreditation reviews; analyze and establish processes for comprehensive systems and data protection; assess and mitigate system security threats and risks; perform security audits, evaluation, risk assessments and make a strategic recommendations; and manages, supports, installs and maintains security tools and systems, and tracks security patches and incidents.

Skills Required:

  • The Information Security Specialist will possess knowledge and experience in standard methodologies used in certification and accreditation processes; extensive experience following NIST guidelines in risk assessment and management; conducting vulnerability analysis; developing mitigation plans; and performing penetration testing, password protection testing and application security testing.

Skills Preferred:

  • Proficient with CyberArk Endpoint Privilege Manager and CyberArk EPM.
  • Knowledge of EPM policies, configurations, and deployment.
  • Understanding of CyberArk architecture and components.
  • Ability to design, deploy, and manage CyberArk EPM solutions.
  • Expertise in creating, managing, and enforcing least privilege policies.
  • Proficient in Loosely Connection Device onboarding and troubleshooting connection and password rotation issues.
  • Understanding of application control and privilege management.
  • Strong technical skills in defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution.
  • Strong technical skills with installation, integration, and deployment of CyberArk Endpoint Privilege Management agent
  • Possess strong troubleshooting skills to diagnose and resolve issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments.
  • Understanding and familiarity with Operating Systems (Unix, Linux, Windows), Network devices, and databases (SQL, Oracle, etc.)
  • Proficient in managing and securing various operating systems, including Windows, Linux, and Unix-based systems,
  • A strong understanding of security concepts, including protection, detection and response (EDR), and endpoint compliance.
  • Possess practical communication skills to interact with stakeholders, team members, and vendors and collaborate on security initiatives, incident response efforts, and knowledge sharing.
  • Familiarity with programming language, preferably Python and PowerShell script.
  • Strong analytical and problem-solving skills and ability to troubleshoot and resolve complex issues.
  • Excellent written and verbal communication skills and ability to explain technical concepts to non-technical stakeholders.
  • Strong organizational and time management skills.

Experience Required:

  • This classification must have a minimum of five (5) years of experience applying security policies, standards, testing, modification and implementation.
  • At least three (3) years of that experience must be in information security analysis.

Experience Preferred:

  • 5+ Experience with overall CyberArk architecture, components, and interdependencies like CyberArk’s Vault, including installation, configuration, and maintenance.
  • 5+ years of experience with installation, integration, and deployment of CyberArk Endpoint Privilege Management
  • 5+ years of experience with onboarding and implementing the Loosely Connection Device feature within the CyberArk EPM solution.
  • 5+ years of experience defining and enforcing access control policies, least privilege principles, and role-based access controls (RBAC) within the CyberArk EPM solution.
  • 5+ years of experience troubleshooting, diagnosing, and resolving issues related to CyberArk EPM deployment, configuration, and integration with endpoint environments.
  • 5+ years of experience implementing the Just in Time feature within the CyberArk EPM solution.
  • 5+ years of experience managing and securing various operating systems, including Windows, Linux, and Unix-based.
  • 5+ years of experience with CyberArk Privileged Access Management routine tasks- Access control, User entitlements, password policy, etc.
  • 5+ years of experience integrating CyberArk solutions with other security tooling, including IAM endpoint management logging, ticketing system, multi-tenant environment, and software distribution tool.
  • 5+ years of experience with CyberArk EPM global policy standards and agent package deployments
  • 5+ years of experience with scripting skills (e.g., PowerShell, Bash) to automate routine tasks, streamline processes, and integrate CyberArk EPM with other security tools and platforms.
  • 5+ years of experience with cloud infrastructure platforms like AWS/Azure integration with CyberArk.
  • 5+ years of understanding of SSO (OAuth, OpenID, SAML, etc.)
  • 5+ years’ experience leading or contributing to cybersecurity projects, especially those involving endpoint protection and privilege management solutions.

Education Required:

  • This classification requires the possession of a bachelor’s degree in an IT-related or Engineering field.
  • Additional qualifying experience may be substituted for the required education on a year-for-year basis.

Verbal communication Troubleshooting Analytical skills Python Problem-solving Databases RBAC time-management Endpoint Detection and Response (EDR) remote work Communication single-sign-on penetration-testing Written communication skills Organizational skills operating-systems

Leave a Reply