and scalable processes, driving technology adoption, spearheading change management initiatives, developing key metrics to assess... analysis, including privileged internal investigations conducted under the supervision and direction of in-house and/or outside...
security. Job Description: Job Title: Lead, Cyber Intelligence Job Code: 28039 Job Location: Orlando, Florida... and/or administering security controls for information systems. Configuration of change management processes (hardware/software, account...
Pillar Lead, test integration of data and attribute-based access into Policy Decision Points (PDP) and Policy Enforcement... a privileged user (PU) account on a government information system prior to starting work. The requirements are currently defined...
and access management strategy aligned with DoD Zero Trust principles, NIST 800-207, and DoD ICAM Reference Design. Lead... access control (ABAC). Conduct the implementation of Privileged Access Management (PAM) and Identity Governance...
and access management strategy aligned with DoD Zero Trust principles, NIST 800-207, and DoD ICAM Reference Design. Lead... access control (ABAC). Conduct the implementation of Privileged Access Management (PAM) and Identity Governance...
tools. Oversee identity governance, including Privileged Identity Management (PIM), access reviews, and Just-in-Time (JIT... technologies (e.g., Microsoft Fabric, Loop) to meet evolving business needs. Implement lifecycle management and access controls...
. Architect robust IAM solutions, including single sign-on (SSO), multi-factor authentication (MFA), privileged access management..., hybrid, and on-premises environments, including identity and access management, encryption, and monitoring controls...
models for cloud, hybrid, and on-premises environments, including identity and access management, encryption, and monitoring... controls. Architect robust IAM solutions, including single sign-on (SSO), multi-factor authentication (MFA), privileged access...
Toolchain Ownership: Take full technical ownership and oversight of Apex’s Identity and Access Management (IAM) toolchain. Lead..., and privileged access management. Expertise with security/authorization models and protocols (SAML, OAuth, OIDC). Strong skills...
technologies such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), FIDO authentication, Privileged Access Management.... Ensure compliance with industry standards and best practices in identity and access management. Provide technical leadership...
and compliance dashboards with KPIs and KRIs. Oversee operational security functions (e.g., privileged access provisioning, IT... and supporting enterprise security technologies, managing the vulnerability management stack, and delivering security risk analytics...
Identity and Access Management (IAM) domain. Serving as the technical lead for enterprise-class IAM security initiatives... Directory security best practices (e.g. Privileged Access Management, credential theft mitigations, tiering model design...
for asset discovery, vulnerability management, network monitoring, endpoint protection, and privileged access management... secure remote access management Familiarity with other vendor tools such as Cisco (network security), ServiceNow (ticketing...
Principal Cyber Security Engineer to lead the firm’s Software as a Service (SaaS) security program, with a primary focus... Trust’s SaaS ecosystem, driving threat detection, posture management, and compliance across critical business applications...
: Architect and oversee enterprise identity governance initiatives and the Privileged Access Management (PAM) platform, ensuring... governance, privileged access management, cloud security controls, and incident response. Experience with data security...
in MSP environments and Privileged Access Management. * Conduct product demonstrations, lead technical discussions..., particularly in the MSP and Privileged Access Management space. This role involves understanding customer needs, providing tailored...
months. Manage and mature privileged access management (PAM) solutions for databases, phasing out legacy access methods... to lead the protection of our cloud-based systems, data, and applications. This is a pivotal role focused on embedding...
Company Description About CyberArk: (NASDAQ: ), is the global leader in . Centered on privileged access management... reoccurrence Use cloud configuration management, deployment and compliance tools such as CloudFormation, Helm, Kubernetes...
Company Description About CyberArk: (NASDAQ: ), is the global leader in . Centered on privileged access management... posture of our organization. You will own, manage, and lead key security initiatives, ensuring our products and systems...
Company Description About CyberArk: (NASDAQ: ), is the global leader in . Centered on privileged access management... a strong foundation in the cybersecurity space. Success in this role requires focus, curiosity, and a willingness to learn. Prior lead...