Who we are looking for:
- Strong understanding of how to implement concepts such as password less authentication, zero trust model, SASE, etc.
- Strong technical skills and experience in architecting and implementing at least one or more solutions such as SailPoint IIQ, SailPoint IdentityNow, One Identity, IBM IGI, Saviynt, ForgeRock, Okta, Microsoft Entra ID, Ping Identity, etc.
- Strong technical skills and experience in architecting and implementing at least one or more PAM solutions such as Beyond Trust PasswordSafe, Beyond Trust Privileged Remote Access, CyberArk, CyberArk Secrets Manager, Delinea, etc.
Hybrid: This role can be performed in a hybrid model, where you can balance work from home and office to match your needs and role requirements.
Want more jobs like this?
Get jobs delivered to your inbox every week.
What you will be responsible for:
- 12+ Years of IT experience with minimum 6+ years' experience with CA PAM Privileged Access Management (PAM) Architecture, Design and Server onboarding.
- Design and implement Privileged Access Management solutions, including privileged account management, session monitoring, and credential vaulting.
- Collaborate with cross-functional teams to ensure PAM controls align with business requirements and industry best practices.
- Develop and enforce policies and procedures for managing privileged accounts across the organization.
- Implement mechanisms for secure provisioning, deprovisioning, and rotation of privileged account credentials.
- Implement controls to enforce the principle of least privilege and minimize the risk of unauthorized access. Define and enforce access policies, roles, and permissions for privileged accounts to ensure appropriate access levels.
- Implement secure credential storage and management solutions to protect privileged account credentials. Ensure encryption, access controls, and auditing mechanisms are in place to safeguard stored credentials.
- Conduct periodic reviews and audits of privileged access rights and activities. Identify and remediate any access anomalies or policy violations within the PAM framework.
- Integrate PAM solutions with other security technologies and systems, such as identity and access management (IAM) platforms and security information and event management (SIEM) systems. Automate PAM processes and workflows to enhance efficiency and reduce manual errors.
- Participate in security incident response activities related to privileged access. Investigate security incidents involving privileged accounts, coordinate response efforts, and implement necessary remediation measures.
- Develop and maintain PAM policies, standards, and procedures. Stay up to date with evolving PAM technologies, industry trends, and regulatory requirements related to privileged access.
State Street's Speak Up Line