Identity and Access Management (IAM) Analyst CyberArk & PAM

C2C
  • C2C
  • Anywhere

Job Title: Identity and Access Management (IAM) Analyst – CyberArk & PAM
Location: Remote
Job Type: Contract

Job Summary:
We are seeking a skilled IAM Analyst with deep expertise in CyberArk and Privileged Access Management (PAM) solutions to enhance our organization’s security posture. This role involves designing, implementing, and managing PAM strategies, ensuring secure access to critical systems and applications. The ideal candidate will thrive in a remote environment and possess a strong understanding of security frameworks and PAM best practices.

Key Responsibilities:

  • Implement, configure, and maintain CyberArk solutions to support enterprise PAM initiatives.
  • Manage privileged account lifecycle, including provisioning, rotation, and deprovisioning of credentials.
  • Conduct PAM tool upgrades, patching, and integrations with enterprise systems.
  • Monitor and troubleshoot privileged access issues to ensure seamless operations.
  • Develop and enforce policies for secure and compliant privileged access.
  • Perform regular audits and provide reports on privileged account activities.
  • Collaborate with security teams to identify and mitigate risks related to privileged accounts.
  • Stay informed about evolving threats and advancements in PAM technologies.

Qualifications:

  • 3-5+ years of experience in IAM with a focus on PAM solutions.
  • Expertise in CyberArk suite (PAM-PSM, EPV, Vault, and AAM).
  • Strong understanding of PAM best practices and compliance standards (e.g., ISO 27001, NIST).
  • Experience with IAM protocols and frameworks (LDAP, Kerberos, SAML, OAuth).
  • Knowledge of scripting (PowerShell, Python) for process automation.
  • Excellent troubleshooting skills and ability to work independently in a remote setting.

Preferred Skills:

  • Familiarity with other PAM tools (e.g., BeyondTrust, Thycotic, or Delinea).
  • Knowledge of endpoint protection solutions and cloud platforms (AWS, Azure, GCP).
  • Certifications such as CyberArk Defender, CyberArk Sentry, or CISSP.

 

Thanks

Debasish Pattnaik

d.pattanaik@mrtechnosoft.com

www.mrtechnosoft.com


From:
Debasish Pattnaik,
MRTECHNOSOFT
d.pattanaik@mrtechnosoft.com
Reply to:   d.pattanaik@mrtechnosoft.com