Cybersecurity operation analyst
valencia, Spain
Alter Solutions
IT and Cybersecurity consulting services in Europe, America and Africa. Discover our expertise in Software development and Cloud computing.Company Description
Our committed to achieving diversity and inclusion within its workforce, providing an environment that reflects the values enshrined in the Charter of the United Nations and encourages all qualified applicants, irrespective of gender, nationality, disabilities, sexual orientation, culture, religious and ethnic backgrounds to apply.
The cybersecurity architecture team (CSA) have been providing and supporting privilege access management (PAM) and Identity and access management (IDAM) project and operations for internal organization and its clients. The team is looking to improve its capacity in supporting the PAM and IDAM functionality.
Job Description
REMOTE POSITION ( CET zone)
A cybersecurity operations analyst who can work to safeguard assets by identifying risks and developing cybersecurity programs, and implementing solutions that support and meet business goals. Shall have very good understanding and experience with PAM and IDAM technologies and Incident Response process.
Duties of Consultant:
🔹Automation of processes across the entire CyberArk product suite Review existing CyberArk implementation and make recommendations and adjustments based on industry best practices.
🔹CyberArk administration, configuration, implementations, designs, and troubleshooting Maintain CyberArk on a daily basis from a tier 3-4 standpoint Resolution of tier 2/3 trouble tickets including password rotations, password malfunctions, account creations, account changes, scheduling.
🔹Installation of CyberArk vault including multiple CPMs and PVWAs.
🔹 Collaborate to define access control, user entitlements, and user access policy management Collaborate to develop and execute overall project plan and timelines for key deliverables Lead initiative to establish operational standards for secrets management service.
🔹Cross-train and develop peers on CyberArk suite of products Work with development teams on integration with Conjur Troubleshooting experience of Vault, CPM, Conjur/AAM and PVWA issues Experience in Privileged Account Management with CyberArk.
🔹PIM Administration Experience with the CyberArk Conjur solution Advanced experience with script development (PowerShell/Python preferred).
🔹Good experience in implementation and integration of Cyber-Ark's Privileged Identity Management (PIM) Suite Experience with PAM Operational tasks - Defining Access Control, User Entitlements, Manage Applications Credentials, User Access Policy Management.
Qualifications
Required Technical Skills:
The resource MUST have the following skills and experience:
- Bachelor's degree preferred in relevant IT field (Software Engineering, Computer Science, Network Security).
- Strong diagnostic and problem solving skills Able to work with confidential materials and employee information and maintain confidentiality at all times.
- Strong knowledge with CyberArk PAM tool
- Good understanding of application vulnerabilities
- Cybersecurity certifications like CISSP, CISM, CEH, etc.
The resource SHOULD have the following skills and experience:
- Strong interpersonal skills demonstrated excellent technical writing skills and project/program management experience.
- Ability to work both independently and collaboratively.
- Good understanding of application SDK and familiarity with password rotation
Additional Information
Required Soft Skills:
- Customer facing experience and oral communication skills
- Ability to write documentation & reports
- Creativity/ ability to find innovative solutions
- Willingness to learn on the job
- Conflict management & cooperation
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation CEH CISM CISSP Computer Science Cyberark IAM Incident response Network security PowerShell Python Vulnerabilities
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs