Cyberark Consultant Resume
2.00/5 (Submit Your Rating)
ChicagO
SUMMARY:
- Total 6+ years of experience in IT with 3 years of expertise inCyberArk, Implementing, managing and monitoring ofCyberArkprivileged account security Suite
- Experience in CyberArk Implementation and Installation on Cyber Ark 8.0 and latest Implementation on Cyber - Ark 9.8
- Exposure in design and architecture of PIM using Cyber-Ark.
- Performed Manage, Resume, Release Privileged Credential usingCyberArkPrivileged Management Vault Administration, configuration, troubleshooting and installation of Windows 2003, 2008, 2008 R2
- Worked on Configurations including AD integration and Management of Cyber ARK.
- Experience in installation of various Operating systems such as Oracle Linux, Red Hat (LINUX) and Windows.
- Worked on boarding of Privilege Accounts toCyber Ark.
- Developed and implemented processes and procedures for on boarding users and Privilege Accounts toCyber Ark.
- Managed active accounts and relationships with customers as well as prospecting and developing new pipeline
- Proficient in SQL programming - Stored Procedures, Functions, Packages, SQL tuning, and creation of Oracle Objects - Tables, Views, Materialized Views, Triggers, Sequences, Synonyms, Database Links, and User Defined Data Types
- Involved in creating documents and conducting training sessions for the end users
PROFESSIONAL EXPERIENCE
Confidential, Chicago
Cyberark Consultant
Roles and Responsibilities:
- Designed and implemented Cyber Ark test and development environment following the SDLC process.
- Managing, monitoring and Supporting systems hardware, software, and applications
- Researching, recommending, and implementing new solutions in support of project and business requirements with focus on security and privacy
- Troubleshooting network/system related issues and managing components in a production environment
- Coordinating efforts with vendors for upgrades and system maintenance
- Proactively recommended technical solutions and innovations
- Confirming that all projects and infrastructure are properly documented
- Provided technical support to tech savvy staff
- Cyber ark integration with SIEM tools like Arc sight, Splunk.
- Actively Monitoring the Arc Sight connectors those pulling the raw data from the client machines.
- PIM suite integration with LDAP.
- On boarding windows and Linux accounts.
- Performsystem, security, and application log and reports reviews following established procedures.
- Fallback from DR vault server to production in case of production vault server failure.
- Prepare standard operating procedures and process documents for first line teams.
- Worked with Cyber Ark utilities like password upload, PAR explicate, PACLI and PAR client.
- Prepare vault server for internal and external audit.
Confidential
Cyberark Engineer
Roles and Responsibilities:
- Experience in providing Technical Training of Cyber Ark by creating PowerPoint document and listing use cases, implementing use cases in demo test environment.
- Expertise in support comprising of L1, L2 level and frequent communication with vendors as well as clients.
- Network Application scans usingCyber ArkDNA and Beyond Trust Retina - Wire shark
- Develop Application - Active Directory - Cyber Ark- Active Roll Server - Implementation plan
- Good understanding of phases Arc Sight ESM event life and describe the functional processing which occurs during each phase.
- Migrate user accounts into Password Vault using Bulk upload utility.
- Manage Safes and Server/ host addresses in EPV.
- Resolve issues with CyberArk's CPM to communicate with hosts to reconcile credentials.
- Performed PAM operational tasks, defining access control, user entitlements, management of Applications Credentials and User Access Policy.
- Design and development of request forms, collectors, approval and fulfillment workflows per application
Confidential
AD Engineer
Roles and Responsibilities:
- Installation, Configuration, and Administration of Windows NT, 2000, MS Exchange 5.5 Servers, McAfee AV Server, and ARC Serve IT.
- Involved in maintaining theActiveDirectoryand GPO management.
- Backup / Recovery of data.
- Provide solution for various applications connect direct/indirect to AD database for user authentication.
- Worked with application developers to troubleshoot LDAP connection to query multiple AD domains.
Environment: Active Directory, MS Exchange 5.5 Servers, Proxy Servers, Windows 2000/2003R2, WSUS,IIS Servers
Confidential
Java Developer
Roles and Responsibilities:
- Preparing technical specifications document
- Worked on setting up the application environment in the development region and developed the configuration files
- Involved in interaction with Business analysts, technical architects to identify the functional and requirement gaps.
- Development of reporting components using Java, JDBC
- Used multithreading to improve performance in generating the reports in Java.
- Development of alert components using Java, JDBC
- Development of interactive user interfaces for viewing, editing, copying, sharing and deleting the reports and alerts using JSP, HTML, JavaScript, CSS and AJAX.
- Extensively involved in writing the SQL queries to fetch data from database for reports.
- Used JavaScript and AJAX for performing client side validation and implemented server side validating business rules in Java.
- Examined the Oracle 9i database tables, stored procedures and views used in the project as part of testing using PL/SQL Developer tool.
- Involved in integration testing and Documentation.
Environment: Java, Servlets, JSP, JAXP, XML, JavaScript, AJAX, CSS, Oracle 9i, Tomcat 5.1