{"id":2350,"date":"2025-06-18T03:06:31","date_gmt":"2025-06-18T03:06:31","guid":{"rendered":"https:\/\/estreetsecurity.com\/services\/?post_type=jobpost&#038;p=2350"},"modified":"2025-06-18T03:07:03","modified_gmt":"2025-06-18T03:07:03","slug":"iam-cyberark-engineer","status":"publish","type":"jobpost","link":"https:\/\/estreetsecurity.com\/services\/jobs\/iam-cyberark-engineer\/","title":{"rendered":"IAM CyberArk Engineer"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">IAM CyberArk Engineer<\/h2>\n\n\n\n<p>Posted: 06\/18\/2025<\/p>\n\n\n\n<p>Job Type: Permanent<\/p>\n\n\n\n<p>Industry: Cybersecurity<\/p>\n\n\n\n<p><strong>eStreetSecurity<\/strong> is partnering with a globally leading Investment Management firm in their search for a skilled <strong>CyberArk Security Engineer<\/strong>. This role is a key addition to their expanding Identity and Access Management (IAM) team, with a significant focus on <strong>Privileged Access Management (PAM)<\/strong>. This position is part of a global IAM Engineering group, primarily headquartered in St. Petersburg, FL. We&#8217;re looking for candidates who bring solid, hands-on experience with <strong>CyberArk<\/strong> and a genuine passion for contributing to a maturing PAM program.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Location &amp; Compensation:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Location:<\/strong> St. Petersburg, FL; Denver, CO; Memphis, TN; Southfield, MI. Remote work will be considered for exceptionally strong candidates.<\/li>\n\n\n\n<li><strong>Salary:<\/strong> $125,000 &#8211; $140,000 base salary range.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">What You&#8217;ll Be Doing:<\/h3>\n\n\n\n<p>As a CyberArk Security Engineer focusing on IAM and PAM, your responsibilities will include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PAM Solution Management:<\/strong> Deploying and managing Privileged Access Management solutions, ensuring optimal security configurations and continuous performance monitoring.<\/li>\n\n\n\n<li><strong>Security Trend Analysis:<\/strong> Staying current with external security trends and thoroughly evaluating their relevance and potential impact on the organization&#8217;s security posture.<\/li>\n\n\n\n<li><strong>Documentation &amp; Training:<\/strong> Producing and maintaining high-quality documentation for technical procedures and user guidance, promoting clear understanding and consistent practices.<\/li>\n\n\n\n<li><strong>Continuous Improvement:<\/strong> Proactively participating in relevant training, pursuing certifications, and actively engaging in knowledge-sharing to support the continuous improvement of the PAM program.<\/li>\n\n\n\n<li><strong>Stakeholder Collaboration:<\/strong> Collaborating effectively with various stakeholders to gather and precisely define business requirements related to identity and access.<\/li>\n\n\n\n<li><strong>CyberArk Module Expertise:<\/strong> Operating across key CyberArk modules such as <strong>EPV (Enterprise Password Vault), PSM (Privileged Session Manager), CPM (Central Policy Manager)<\/strong>, and others. This includes providing expertise in the onboarding, offboarding, and comprehensive account lifecycle management within CyberArk.<\/li>\n\n\n\n<li><strong>Process Development:<\/strong> Developing and meticulously documenting PAM-related processes, creating standardized templates, and establishing clear usage guidelines for the organization.<\/li>\n\n\n\n<li><strong>Service Delivery Support:<\/strong> Establishing efficient workflows and integrating with ticketing processes to streamline PAM service delivery and issue resolution.<\/li>\n\n\n\n<li><strong>Reporting &amp; Metrics:<\/strong> Providing essential operational metrics and detailed reporting on PAM activities to demonstrate program effectiveness and identify areas for enhancement.<\/li>\n\n\n\n<li><strong>Continuous Control Monitoring:<\/strong> Implementing Continuous Control Monitoring mechanisms to uphold and enforce security best practices across all PAM initiatives.<\/li>\n\n\n\n<li><strong>On-Call Rotation:<\/strong> Participating in a rotating on-call schedule, which may involve working non-standard hours as needed to ensure continuous support.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">What&#8217;s Needed:<\/h3>\n\n\n\n<p>We&#8217;re seeking a candidate with a strong foundation and practical experience:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CyberArk Experience:<\/strong> <strong>3+ years of hands-on experience<\/strong> specifically with <strong>CyberArk<\/strong> and <strong>Privileged Access Management (PAM)<\/strong> solutions.<\/li>\n\n\n\n<li><strong>IT Security Principles:<\/strong> A strong understanding of core IT security principles applicable across both <strong>Windows and Linux environments<\/strong>.<\/li>\n\n\n\n<li><strong>Independent &amp; Leadership Capabilities:<\/strong> Proficiency in working independently, taking initiative, and offering technical leadership when required.<\/li>\n\n\n\n<li><strong>Project Lifecycle Experience:<\/strong> Proven experience in requirement gathering, process mapping, and comprehensive systems testing within an IT security context.<\/li>\n\n\n\n<li><strong>Compliance &amp; Risk Knowledge:<\/strong> Familiarity with IT compliance frameworks, risk management methodologies, and business continuity standards.<\/li>\n\n\n\n<li><strong>Problem-Solving:<\/strong> Demonstrated problem-solving skills and the ability to effectively troubleshoot complex technical issues in a timely manner.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Technical Knowledge:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CyberArk &amp; Ticketing Systems:<\/strong> Expertise with various <strong>CyberArk<\/strong> components and experience with ticketing systems (<strong>ServiceNow preferred<\/strong>).<\/li>\n\n\n\n<li><strong>Active Directory:<\/strong> A strong grasp of <strong>Microsoft Active Directory architecture<\/strong>.<\/li>\n\n\n\n<li><strong>Preferred CyberArk Experience:<\/strong> Experience with <strong>CyberArk Privileged Cloud<\/strong> (preferred) and <strong>CyberArk Secrets Management \/ Conjur<\/strong> (preferred).<\/li>\n\n\n\n<li><strong>Monitoring Tools:<\/strong> Familiarity with <strong>Splunk<\/strong> (preferred).<\/li>\n\n\n\n<li><strong>Scripting Proficiency:<\/strong> Proficiency in scripting languages such as <strong>PowerShell, Python, or Java<\/strong>.<\/li>\n\n\n\n<li><strong>OS Understanding:<\/strong> A solid understanding of <strong>Windows and Linux server and workstation operating systems<\/strong>.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Certifications:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>CyberArk Defender certification required.<\/strong><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Work Schedule:<\/h3>\n\n\n\n<p>This position includes participation in a rotating on-call schedule and may require working outside traditional business hours to ensure continuous operational support.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IAM CyberArk Engineer Posted: 06\/18\/2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a globally leading Investment Management firm in their search for a skilled CyberArk Security Engineer. This role is a key addition to their expanding Identity and Access Management (IAM) team, with a significant focus on Privileged Access Management (PAM). This position [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":0,"template":"","jobpost_category":[231],"jobpost_job_type":[273,230,277],"jobpost_location":[493,494,496,492],"jobpost_tag":[442,504,501,239,508,502,503,498,288,511,499,515,497,332,514,271,506,487,512,509,279,379,243,280,500,245,339,441,513,505,510,507],"class_list":["post-2350","jobpost","type-jobpost","status-publish","hentry","jobpost_category-security","jobpost_job_type-onsite","jobpost_job_type-permanent","jobpost_job_type-remote","jobpost_location-denver-co","jobpost_location-memphis-tn","jobpost_location-southfield-mi-2","jobpost_location-st-petersburg-fl","jobpost_tag-active-directory","jobpost_tag-conjur","jobpost_tag-cpm","jobpost_tag-cyberark","jobpost_tag-cyberark-defender","jobpost_tag-cyberark-privileged-cloud","jobpost_tag-cyberark-secrets-management","jobpost_tag-cyberark-security-engineer","jobpost_tag-cybersecurity","jobpost_tag-denver-co","jobpost_tag-epv","jobpost_tag-estreetsecurity","jobpost_tag-iam-cyberark-engineer","jobpost_tag-identity-and-access-management","jobpost_tag-investment-management","jobpost_tag-it-security","jobpost_tag-java","jobpost_tag-linux","jobpost_tag-memphis-tn","jobpost_tag-on-call","jobpost_tag-pam","jobpost_tag-permanent","jobpost_tag-powershell","jobpost_tag-privileged-access-management","jobpost_tag-psm","jobpost_tag-python","jobpost_tag-remote","jobpost_tag-servicenow","jobpost_tag-southfield-mi","jobpost_tag-splunk","jobpost_tag-st-petersburg-fl","jobpost_tag-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost\/2350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost"}],"about":[{"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/types\/jobpost"}],"author":[{"embeddable":true,"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/media?parent=2350"}],"wp:term":[{"taxonomy":"jobpost_category","embeddable":true,"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost_category?post=2350"},{"taxonomy":"jobpost_job_type","embeddable":true,"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost_job_type?post=2350"},{"taxonomy":"jobpost_location","embeddable":true,"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost_location?post=2350"},{"taxonomy":"jobpost_tag","embeddable":true,"href":"https:\/\/estreetsecurity.com\/services\/wp-json\/wp\/v2\/jobpost_tag?post=2350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}