Cyber SDC - Privileged Access Management - Senior - Location OPEN
divpspan style=font-family:arial, helvetica, sans-serifLocation: Anywhere in Country/span/pp /ppspan style=font-family:arial, helvetica, sans-serifAt EY, we’re all in to shape your future with confidence. /span/pp /ppspan style=font-family:arial, helvetica, sans-serifWe’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world./span/p/divdiv /divp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackIn an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each clients unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity./span/pp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackThe Opportunity/span/strongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackbrWe currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting-edge tools and techniques to address some of the most relevant and pressing security challenges in the world./span/pp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackAt our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third-party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions./span/pp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackYour Key Responsibilities/span/strong/pul style=margin-top:0.0in;margin-bottom:0.0in type=discli style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifSupport the development of privilege and secret access management controls (CyberArk, BeyondTrust, HashiCorp, and Delinea solutions)./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifAssist in the design and implementation of privileged access and secret management solutions./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifParticipate in requirement gathering and definition of use cases at the enterprise level for privilege and secret management./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifConfigure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (CyberArk, HashiCorp, Delinea, BeyondTrust), including auto-detection and auto-onboarding./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifSupport onboarding target systems such as Windows, Linux, and Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of DevOps solutions (Ansible, Puppet, Jenkins, Kubernetes, OpenShift, GitHub, GitLab, Docker)./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifDemonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifAssist in defining and implementing vaulting, rotation, and heartbeat policies for human and non-human identities; enable SSH key and password rotation, check-out/check-in, dual control, and break-glass./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifParticipate in the self-service design and implementation of privilege or secrets life cycle management using enterprise identity governance solutions (creation, management, certification, deletion)./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifContributes to the development and establishment of governance processes for non-human identity management./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifSupport the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers./span/li/ulp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackSkills and Attributes for Success/span/strong/pul style=margin-top:0.0in;margin-bottom:0.0in type=discli style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifProven experience in integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on CyberArk (vault, privilege cloud, secure, infrastructure, Endpoint Access Management, and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifIn-depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifPractical expertise in developing CyberArk technology tech stack, HashiCorp Vault, BeyondTrust, and Delinea experience./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifProficiency in implementing, managing, and maintaining enterprise-level privilege access management and secret management tools./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifSolid understanding of enterprise directory services such as Active Directory, Azure AD, and LDAP, as well as experience in implementing MFA and SSO solutions./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifStrong problem-solving and analytical skills, with the ability to translate business requirements into technical specifications and execute technical deliveries effectively./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifA track record of delivering high-quality client services and work products within expected timeframes./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifExcellent documentation skills, including the creation of procedures, process documentation, and user documentation related to IAM applications./span/li/ulp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackTo Qualify for the Role, You Must Have/span/strong/pul style=margin-top:0.0in;margin-bottom:0.0in type=discli style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifA bachelors degree in a related field and approximately 4–6 years of related work experience; or a graduate degree and approximately 2–4 years of related work experience./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifExperience with PAM architecture and development within CyberArk, HashiCorp, or other PAM solutions./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifHands-on experience with CyberArk Conjur and HashiCorp Vault usage and functionality./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifA valid drivers license in the US and/or a valid passport; willingness and ability to travel./span/li/ulp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackIdeally, You’d Also Have/span/strong/pul style=margin-top:0.0in;margin-bottom:0.0in type=discli style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifProfessional certifications in Identity amp; Access Management, such as CISSP, CISM, or specific vendor certifications like CyberArk CDE, Hashi Vault Certified Implementation Engineer./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifFamiliarity with additional IAM technologies and tools, including SailPoint, ForgeRock, Ping Identity, RSA, etc./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifKnowledge of cloud-based IAM solutions and experience working with cloud platforms like AWS, Azure, or Google Cloud./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifUnderstanding of regulatory compliance frameworks and industry standards related to IAM, such as GDPR, HIPAA, NIST, or ISO 27001./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifPrior experience in providing PAM services to clients from various industries, demonstrating versatility and adaptability in addressing diverse IAM challenges./span/lili style=color:black;margin-top:0.0in;margin-right:0.0in;margin-bottom:8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serifStrong interpersonal and communication skills, with the ability to collaborate effectively with clients and cross-functional teams to present solution designs, options, and innovations./span/li/ulp style=margin:0.0in 0.0in 8.0pt;line-height:107%;font-size:11.0pt;font-family:Calibri, sans-serifstrongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackWhat We Look For/span/strongspan style=font-size:10.5pt;line-height:107%;font-family:Arial, sans-serif;color:blackbrWe’re interested in intellectually curious people with a genuine passion for cybersecurity. With your broad exposure across IAM, we’ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us – but also to the industry at large. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you./span/pdivp /pp /ppspan style=font-family:arial, helvetica, sans-serifstrongWhat we offer you/strong/spanbrspan style=font-family:arial, helvetica, sans-serifAt EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn a href= style=font-family:arial, helvetica, sans-serifspan style=font-family:arial, helvetica, sans-serifWe offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $106,800 to $194,800. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $128,000 to $221,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options./span/lili style=font-family:arial, helvetica, sans-serifspan style=font-family:arial, helvetica, sans-serifJoin us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year./span/lili style=font-family:arial, helvetica, sans-serifspan style=font-family:arial, helvetica, sans-serifUnder our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being./span/li/ulp /ppspan style=font-family:arial, helvetica, sans-serifstrongAre you ready to shape your future with confidence? Apply today. /strong/spanbrspan style=font-family:arial, helvetica, sans-serifEY accepts applications for this position on an on-going basis.strong /strong/span/pp /ppspan style=font-family:arial, helvetica, sans-serifFor those living in California, please click a href= for additional information./span/pp /ppspan style=font-family:arial, helvetica, sans-serifEY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities./span/pp /ppspan style=font-family:arial, helvetica, sans-serifstrongEY | Building a better working world/strong/span/pp /ppspan style=font-family:arial, helvetica, sans-serifEY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets./span/pp /ppspan style=font-family:arial, helvetica, sans-serifEnabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow./span/pp /ppspan style=font-family:arial, helvetica, sans-serifEY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories./span/pp /ppspan style=font-family:arial, helvetica, sans-serifEY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. /span/pp /ppspan style=font-family:arial, helvetica, sans-serifEY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY’s Talent Shared Services Team (TSS) or email the TSS at a href= mailto: [email protected]@ey.com/a./span/p/d…
Recommended Jobs
Customer Operations - Digital Marketing Analyst
Position Overview Support customer operations and core recruiting workflows while contributing to digital marketing, brand visibility, and social media engagement. This role blends operational ana…
MISS: HVAC Supervisor (Contingency Hire)
Title: MISS: HVAC Supervisor (Contingency Hire) Belong, Connect, Grow with KBR! Program Summary The MISS program is a comprehensive initiative aimed at supporting the US Department o…
Remote Market Research Assistant Earn Up to $50/Task
Compensation: $45$90 per completed task The Consumer Insights Division of our organization is expanding its nationwide research team. We are seeking dependable individuals to support ongoing studie…
Assistant Director of Banquets- Hilton Anatole
The beautiful Hilton Anatole located in the heart of Dallas is searching for a dynamic Assistant Director of Banquets to join their team. The amazing property boasts 600,000 square feet of event s…
216916 - Material Coordinator
Chipton-Ross is seeking a Material Coordinator for a contract opportunity in San Antonio, TX. BASIC QUALIFICATIONS (REQUIRED SKILLS/EXPERIENCE): Ability to obtain security clearance is required fo…
Director, Industrial Engineering
Join Our Team As part of our Cinemark Universe, you'll discover fun opportunities with real growth potential and plenty of perks. With 500+ theatres and nearly 6,000 screens; we're truly a global …
CFS Representative (Senior - Leader)
We are looking for the right people - people who want to innovate, achieve, grow and lead. We attract and retain the best talent by investing in our employees and empowering them to develop themselves…
Military Veteran Mechanic - Sterling Kia
Kia Retailers are offering skilled and experienced military Veterans with the opportunity to begin an inspiring career as a Kia Certified Service Technician. To support this Kia Retailer initiative, …
Senior Director, Regulatory Affairs
The Senior Director, Regulatory Affairs is a key strategist, responsible for developing regulatory strategy for the Endoscopy business unit and delivering Stryker’s best-in-class visualization an…
Physical Therapist - Outpatient - License Required
ATTENTION: This position requires graduation as a Doctor of Physical Therapy (or equivalent standing) and a state license as a Physical Therapist. Now Hiring: Physical Therapist - Full-time Out…