logo

View all jobs

Privilege Access Management Security Engineer 16292107

Washington, DC

We are seeking highly motivated and creative individuals who are enthusiastic about contributing to the growth of a unique endeavor in our markets. The ideal candidate for the Privileged Access Management Security Engineer role will be responsible for the following tasks:

  • Managing Privileged Access Management (PAM) technologies, including account management, secrets management, and software/systems patching.
  • Implementing and automating processes for administration and seamless integration with external services.
  • Playing a pivotal role in developing the PAM Security Strategy, encompassing provisioning, password management, access policies, SSH key management, API key management, and reporting.
  • Integrating the PAM solution with various technologies, such as VMWare or other Identity and Access Management (IDM) solutions.
  • Creating and maintaining documentation, procedures, inventories, and diagrams related to PAM systems and processes.
  • Monitoring and addressing capacity and performance requirements of the PAM infrastructure.
  • Providing rotational on-call support for production PAM infrastructure systems and processes.

Required Qualifications:

  • Familiarity with Identity and Access Management (IAM) or Privileged Access Management (PAM) in one or more of the following areas: Access Certification, Provisioning/De-Provisioning, Application On-boarding, Single Sign-On, Identity Federation, Privileged Access Management, Multi-factor Authentication, Conditional Access.
  • Experience with Centrify/Delinea is a prerequisite.
  • Proficiency in working with cloud management platforms like AWS, Azure, etc.
  • A minimum of two (2) years of experience in scripting languages such as VBScript, PowerShell, Bash, and Perl.

Desired Qualifications:

  • A relentless desire to learn and solve complex problems, driven by enduring curiosity.
  • A profound appreciation for the journey and process of mastering skills, demonstrating a passion for overcoming challenges.
  • Strong motivation to excel in consulting, IT, cybersecurity, and a commitment to following industry best practices.

Clearance:

Applicants selected for this position may be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Share This Job

Powered by