We provide IT Staff Augmentation Services!

Cyberark Consultant Resume

4.00/5 (Submit Your Rating)

ChicagO

SUMMARY:

  • Total 6+ years of experience in IT with 3 years of expertise inCyberArk, Implementing, managing and monitoring ofCyberArkprivileged account security Suite
  • Experience in CyberArk Implementation and Installation on Cyber Ark 8.0 and latest Implementation on Cyber - Ark 9.8
  • Exposure in design and architecture of PIM using Cyber-Ark.
  • Performed Manage, Resume, Release Privileged Credential usingCyberArkPrivileged Management Vault Administration, configuration, troubleshooting and installation of Windows 2003, 2008, 2008 R2
  • Worked on Configurations including AD integration and Management of Cyber ARK.
  • Experience in installation of various Operating systems such as Oracle Linux, Red Hat (LINUX) and Windows.
  • Worked on boarding of Privilege Accounts toCyber Ark.
  • Developed and implemented processes and procedures for on boarding users and Privilege Accounts toCyber Ark.
  • Managed active accounts and relationships with customers as well as prospecting and developing new pipeline
  • Proficient in SQL programming - Stored Procedures, Functions, Packages, SQL tuning, and creation of Oracle Objects - Tables, Views, Materialized Views, Triggers, Sequences, Synonyms, Database Links, and User Defined Data Types
  • Involved in creating documents and conducting training sessions for the end users

PROFESSIONAL EXPERIENCE

Confidential, Chicago

Cyberark Consultant

Roles and Responsibilities:

  • Designed and implemented Cyber Ark test and development environment following the SDLC process.
  • Managing, monitoring and Supporting systems hardware, software, and applications
  • Researching, recommending, and implementing new solutions in support of project and business requirements with focus on security and privacy
  • Troubleshooting network/system related issues and managing components in a production environment
  • Coordinating efforts with vendors for upgrades and system maintenance
  • Proactively recommended technical solutions and innovations
  • Confirming that all projects and infrastructure are properly documented
  • Provided technical support to tech savvy staff
  • Cyber ark integration with SIEM tools like Arc sight, Splunk.
  • Actively Monitoring the Arc Sight connectors those pulling the raw data from the client machines.
  • PIM suite integration with LDAP.
  • On boarding windows and Linux accounts.
  • Performsystem, security, and application log and reports reviews following established procedures.
  • Fallback from DR vault server to production in case of production vault server failure.
  • Prepare standard operating procedures and process documents for first line teams.
  • Worked with Cyber Ark utilities like password upload, PAR explicate, PACLI and PAR client.
  • Prepare vault server for internal and external audit.

Confidential

Cyberark Engineer

Roles and Responsibilities:

  • Experience in providing Technical Training of Cyber Ark by creating PowerPoint document and listing use cases, implementing use cases in demo test environment.
  • Expertise in support comprising of L1, L2 level and frequent communication with vendors as well as clients.
  • Network Application scans usingCyber ArkDNA and Beyond Trust Retina - Wire shark
  • Develop Application - Active Directory - Cyber Ark- Active Roll Server - Implementation plan
  • Good understanding of phases Arc Sight ESM event life and describe the functional processing which occurs during each phase.
  • Migrate user accounts into Password Vault using Bulk upload utility.
  • Manage Safes and Server/ host addresses in EPV.
  • Resolve issues with CyberArk's CPM to communicate with hosts to reconcile credentials.
  • Performed PAM operational tasks, defining access control, user entitlements, management of Applications Credentials and User Access Policy.
  • Design and development of request forms, collectors, approval and fulfillment workflows per application

Confidential

AD Engineer

Roles and Responsibilities:

  • Installation, Configuration, and Administration of Windows NT, 2000, MS Exchange 5.5 Servers, McAfee AV Server, and ARC Serve IT.
  • Involved in maintaining theActiveDirectoryand GPO management.
  • Backup / Recovery of data.
  • Provide solution for various applications connect direct/indirect to AD database for user authentication.
  • Worked with application developers to troubleshoot LDAP connection to query multiple AD domains.

Environment: Active Directory, MS Exchange 5.5 Servers, Proxy Servers, Windows 2000/2003R2, WSUS,IIS Servers

Confidential

Java Developer

Roles and Responsibilities:

  • Preparing technical specifications document
  • Worked on setting up the application environment in the development region and developed the configuration files
  • Involved in interaction with Business analysts, technical architects to identify the functional and requirement gaps.
  • Development of reporting components using Java, JDBC
  • Used multithreading to improve performance in generating the reports in Java.
  • Development of alert components using Java, JDBC
  • Development of interactive user interfaces for viewing, editing, copying, sharing and deleting the reports and alerts using JSP, HTML, JavaScript, CSS and AJAX.
  • Extensively involved in writing the SQL queries to fetch data from database for reports.
  • Used JavaScript and AJAX for performing client side validation and implemented server side validating business rules in Java.
  • Examined the Oracle 9i database tables, stored procedures and views used in the project as part of testing using PL/SQL Developer tool.
  • Involved in integration testing and Documentation.

Environment: Java, Servlets, JSP, JAXP, XML, JavaScript, AJAX, CSS, Oracle 9i, Tomcat 5.1

We'd love your feedback!