At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In identity and access management at PwC, you will focus on confirming secure and efficient access to systems and data for employees and/or clients. Your work will involve the design and implementation of strategies to protect sensitive information and manage user identities.Focused on relationships, you are building meaningful client connections, and learning how to manage and inspire others. Navigating increasingly complex situations, you are growing your personal brand, deepening technical expertise and awareness of your strengths. You are expected to anticipate the needs of your teams and clients, and to deliver quality. Embracing increased ambiguity, you are comfortable when the path forward isn’t clear, you ask questions, and you use these moments as opportunities to grow.
Skills
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
- Respond effectively to the diverse perspectives, needs, and feelings of others.
- Use a broad range of tools, methodologies and techniques to generate new ideas and solve problems.
- Use critical thinking to break down complex concepts.
- Understand the broader objectives of your project or role and how your work fits into the overall strategy.
- Develop a deeper understanding of the business context and how it is changing.
- Use reflection to develop self awareness, enhance strengths and address development areas.
- Interpret data to inform insights and recommendations.
- Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.
Years of experience:
4 - 9 years
Certification- CDE/Sentry(mandatory)
CyberArk Experienced Senior Associate
- Must have 4 - 9 years of experience in the understanding, working knowledge, architecture and
Configuration Skills Including The Following CyberArk Areas
- Vault security layers
- Vault installation and configuration (including high availability architecture)
○ Load balancing across components○ CPM and PVWA installation and configuration○ Users, Groups and LDAP integration○ Access Control and Safe Design○ Password Management■ Safes, Policies and Accounts■ Logon Accounts■ Password Reconciliation■ Exclusive and one-time passwords■ Database passwords■ Dual control and workflow■ Auto detection■ Discovery and Audit (DNA) Module■ Password upload utility■ Privileged Session Manager■ Backup and restore■ Disaster recovery vault○ Privileged Session Manager (PSM) configuration (preferably with Windows, Unix anddatabases)
Roles And Responsibilities
- Document, and prioritize PAM requirements across business, infrastructure, cloud, and application teams; create process maps, user stories, use cases, and acceptance criteria.
- Design and oversee implementation of CyberArk PAS (Vault, PVWA, CPM, PSM, PTA) on-prem and/or cloud.
- Define and implement user policies, certification campaigns, and privileged account provisioning and de-provisioning workflows (joiner/mover/leaver, access request/approval, recertification).
- Manage onboarding of target systems and applications into CyberArk, including Windows, Unix/Linux, databases, web portals, RDP/Citrix published apps, network devices, and cloud services (AWS/Azure/GCP).
- Configure and optimize discovery tools for accounts, services, SSH keys, and tasks (CyberArk discovery services), including auto-detection and auto-onboarding.
- Implement application-to-application credential delivery:
- CyberArk AAM/CCP and PAS Web Services for secrets injection.
- Define and implement vaulting, rotation, and heartbeat policies for human and non-human identities; enable SSH key and password rotation, check-out/check-in, dual control, and break-glass.
Education Qualification
B.E./B.Tech