JobRialto
CyberArk Engineer
JobRialto, Atlanta, Georgia, United States, 30383
Job Summary
This role is responsible for the support of comprehensive identity governance & access management solutions. It requires hands-on engineering and operational responsibilities supporting CyberArk, Okta, Certificate Management, and associated processes. The candidate should be a detailed-oriented performer who wants to be part of a growing global IAM program.
Key Responsibilities
• Participation in the development of workflows, system configuration, change documentation, optimization, and support related to access, while working with application teams to deploy new applications & functionality.
• Responsible for the development of organization-wide policies and procedures, while effectively communicating policies and procedures impacting Identity & Access Management to end users, leadership, and peers to ensure compliant practices.
• Responsible for the ongoing maintenance, testing, support, and optimization of Identity Governance and Role-Based Access Controls (RBAC).
• Responsible for user account life cycle management, including creating, provisioning, securing, and inactivation of access.
• Responsible for the design, implementation, and support of the IAM technologies across the following platforms: SailPoint, CyberArk, Venafi (Certificate Management), and Okta.
• Responsible for troubleshooting, identification, and resolution of technical IAM-related issues.
Required Qualifications
• 5+ years of experience.
• Extensive hands-on knowledge of IAM best practices, procedures, and software solutions such as CyberArk, Okta, Ping Identity, and Directory Services.
• Comprehensive knowledge and experience with authentication standards & technologies, such as single sign-on (SSO), two-factor authentication, privileged access management.
• Experience with one or more programming languages such as C++, Java, Python, or JavaScript.
• Experience with Windows, Linux/Unix, scripting (PowerShell, or Perl), Active Directory, LDAP, SQL, and web services.
Preferred Qualifications
• Experience with Microsoft Directory Integrations (Active Directory/AD Agent).
• Experience with traditional IAM solutions (i.e., SailPoint IIQ, CyberArk, Venafi (Certificate Management)).
• Experience with Okta components and tenant configuration.
• Experience with Logs Management tools (Splunk, QRadar, and Okta reporting).
• Excellent communications, presentation, and documentation skills.
• Experience with Requirement Analysis & Technical Troubleshooting.
• Experience with System & Technology Integration.
• Experience with Lean Management tools or Agile Methodologies processes.
• Ability to work comfortably under pressure and deliver on tight deadlines.
• Ability to analyze data and information with a detailed understanding of regulatory requirements, as well as security frameworks and IAM methodologies.
• Ability to maintain the highest standards of confidentiality, integrity, and personal accountability when working with sensitive & restricted data.
Certifications
• Bachelor's degree in IT, cybersecurity, computer information systems, or related field.
Education:
Bachelors Degree
This role is responsible for the support of comprehensive identity governance & access management solutions. It requires hands-on engineering and operational responsibilities supporting CyberArk, Okta, Certificate Management, and associated processes. The candidate should be a detailed-oriented performer who wants to be part of a growing global IAM program.
Key Responsibilities
• Participation in the development of workflows, system configuration, change documentation, optimization, and support related to access, while working with application teams to deploy new applications & functionality.
• Responsible for the development of organization-wide policies and procedures, while effectively communicating policies and procedures impacting Identity & Access Management to end users, leadership, and peers to ensure compliant practices.
• Responsible for the ongoing maintenance, testing, support, and optimization of Identity Governance and Role-Based Access Controls (RBAC).
• Responsible for user account life cycle management, including creating, provisioning, securing, and inactivation of access.
• Responsible for the design, implementation, and support of the IAM technologies across the following platforms: SailPoint, CyberArk, Venafi (Certificate Management), and Okta.
• Responsible for troubleshooting, identification, and resolution of technical IAM-related issues.
Required Qualifications
• 5+ years of experience.
• Extensive hands-on knowledge of IAM best practices, procedures, and software solutions such as CyberArk, Okta, Ping Identity, and Directory Services.
• Comprehensive knowledge and experience with authentication standards & technologies, such as single sign-on (SSO), two-factor authentication, privileged access management.
• Experience with one or more programming languages such as C++, Java, Python, or JavaScript.
• Experience with Windows, Linux/Unix, scripting (PowerShell, or Perl), Active Directory, LDAP, SQL, and web services.
Preferred Qualifications
• Experience with Microsoft Directory Integrations (Active Directory/AD Agent).
• Experience with traditional IAM solutions (i.e., SailPoint IIQ, CyberArk, Venafi (Certificate Management)).
• Experience with Okta components and tenant configuration.
• Experience with Logs Management tools (Splunk, QRadar, and Okta reporting).
• Excellent communications, presentation, and documentation skills.
• Experience with Requirement Analysis & Technical Troubleshooting.
• Experience with System & Technology Integration.
• Experience with Lean Management tools or Agile Methodologies processes.
• Ability to work comfortably under pressure and deliver on tight deadlines.
• Ability to analyze data and information with a detailed understanding of regulatory requirements, as well as security frameworks and IAM methodologies.
• Ability to maintain the highest standards of confidentiality, integrity, and personal accountability when working with sensitive & restricted data.
Certifications
• Bachelor's degree in IT, cybersecurity, computer information systems, or related field.
Education:
Bachelors Degree