Configure and administer Privileged Access Management (PAM) solutions (e.g. ARCON,CyberArk, BeyondTrust, Thycotic) to manage, monitor, and secure privileged accounts.
Implement policies to enforce least privilege principles across the organization for critical systems, applications, and databases.
Automate privileged account provisioning, password vaulting, session recording, and auditing to ensure compliance with internal policies and industry regulations.
Integrate PAM solutions with other security tools (e.g., SIEM systems, vulnerability management tools) to ensure comprehensive monitoring and response capabilities.
Troubleshoot and resolve issues related to privileged access, including access control and session management.
IAM (Identity and Access Management):
Design and manage Identity Access Management (IAM) solutions for user authentication, authorization, and lifecycle management (e.g., Okta, SailPoint, Microsoft Azure AD).
Implement Single Sign-On (SSO) and Multi-Factor Authentication (MFA) solutions to strengthen user authentication and improve access security across cloud and on-premises applications.
Administer role-based access control (RBAC) and attribute-based access control (ABAC) policies to ensure secure and efficient user access management.
Automate user provisioning and de-provisioning workflows, access reviews, and reporting to ensure compliance with regulatory requirements.
Integrate IAM solutions with HR, Active Directory (AD), and third-party applications to streamline identity management processes.
Experience in implementing Identity Access Governance framework and enforcing SOD (Segregation of Duties)
Document IDAM architectures, configurations, and standard operating procedures (SOPs)
Access Control & Risk Management:
Define and implement access control models (e.g., RBAC, ABAC) and ensure that systems adhere to the principle of least privilege.
Conduct access reviews and entitlement audits to ensure compliance with internal and external regulatory requirements (e.g., SOX, HIPAA, GDPR).
Develop and enforce risk-based access policies to address vulnerabilities related to identity management and privileged access.
Integration & Automation:
Integrate PAM and IAM tools with enterprise applications, databases, cloud environments, and security platforms to provide a seamless, automated access control system.
Perform API integrations for seamless access management across cloud and on-premise systems.
Collaboration & Documentation:
Collaborate with cross-functional teams (e.g., Security Operations, Infrastructure, Compliance) to ensure access controls align with organizational security policies and compliance requirements.
Develop and maintain comprehensive technical documentation, including system configurations, integration guides, and process workflows.
Qualifications:
Experience with PAM tools such as ARCON, CyberArk, BeyondTrust, Thycotic, or similar.
Expertise in IAM tools such as Okta, SailPoint, Microsoft Azure AD, or equivalent.
Strong understanding of access control models (e.g., RBAC, ABAC), SSO, MFA, and Identity Federation.
Hands-on experience with LDAP, Active Directory (AD), Azure AD, and cloud-based IAM solutions.
Solid knowledge of security protocols such as SAML, OAuth, OpenID Connect, Kerberos, and RADIUS.
Experience with auditing, monitoring, and SIEM integration for IAM/PAM solutions (e.g., Splunk, QRadar).
Strong understanding of security best practices, vulnerability management, and risk assessment in an IAM/PAM context.
Certification from leading OEM like SailPoint IdentityNow, Saviynt, Okta, CyberArk, or Ping Identity certifications