Apply

BeyondTrust Engineer

Posted 1 day agoViewed

View full description

💎 Seniority level: Middle, 3-5 years

📍 Location: Canada

🏢 Company: KeyData Cyber

🗣️ Languages: English

⏳ Experience: 3-5 years

🪄 Skills: CybersecurityLDAPCommunication SkillsRESTful APIsProblem-solving skillsScripting

Requirements:
  • 3-5 years of experience as a BeyondTrust Engineer.
  • Bachelor’s or master’s degree in computer science, Computer Engineering, Management Information Systems, or equivalent experience.
  • 3 years of progressive experience designing and implementing Privileged Access Management (PAM) solutions for enterprise organizations with relevant certifications and credentials such as Certified CyberArk Delivery Engineer (CDE).
  • Hands-on experience with BeyondTrust or other PAM solutions.
  • 3 years of experience in gathering PAM business requirements and developing the technical design document.
  • 3 years of experience designing, developing, or implementing PAM systems.
  • Strong knowledge of IT systems, hardware, software, and network technologies.
  • Ability to work in a team environment as well as independently.
  • Strong verbal and written communication skills.
  • Ability to solve complex problems while effectively communicating technical concepts.
  • Previous consulting experience would be an asset.
Responsibilities:
  • Define, design, develop, and implement PAM solutions (e.g., Beyond Trust, CyberArk, Centrify among others) for complex enterprise organizations, from designing hardware specifications and resolving infrastructure dependencies to installation and configuration of the tool.
  • Collaborate with clients to implement solutions for the management of privileged credentials and lead a dialogue with system administrators and application owners to design solutions that meet their needs.
  • Help in Defining PAM Governance Frameworks and PAM Processes.
  • Assess and analyze the client’s environment to identify critical deficiencies and recommend solutions for improvement, target architectures, and a roadmap.
  • Educate both business and IT stakeholders on the implemented solutions and their significance.
  • Generate comprehensive support documentation and facilitate knowledge transfer sessions to ensure effective system comprehension.
  • Define standard operating procedures (SOPs) and implementation/deployment plans for Privileged Access Management.
Apply