We provide IT Staff Augmentation Services!

Cyberark Analyst Resume

2.00/5 (Submit Your Rating)

Chattanooga, TN

SUMMARY:

  • Over 7 years of experience in Software Design and Development with Organizing, Implementations, specialization, and Security.
  • Good Involvement in Execution and combination of CyberArk's Privileged Identity Management (PIM) Suite.
  • Experience in CyberArk Implementation and Installation on CyberArk 7.0 and most recent Implementation on CyberArk 8.1.0 and CyberArk 9.7
  • Installation and capacity management of CyberArk Privilege Session Manager (PSM) including RDS Session host and licensing.
  • Installation, configuration and troubleshooting of AIM clients for various teams and Supported Identity Access Management (IAM).
  • Installation, configuration and management of MS System Center Configuration Manager 2007/2012(SCCM) infrastructure. Patched servers in pre - prod, Prod and DR environments for approved MS updates.
  • Experience with PAM Operational Tasks Defining Access Control, User Entitlements, Manage Applications Credentials and User Access Policy Management.
  • Experience in performing Privileged Access Reviews, Compliance Reporting, Access Control Processes and other associated tasks with Privileged User Management.
  • Installed, Managed and Troubleshot DNS in multiple zone environments. Troubleshot DNS integration with Active Directory. Installed, configured and administered WINS, DHCP, IIS and WSFTP, File and Print servers.
  • Troubleshooting and Maintenance of the Password Vault, CPM, PSM, AIM, DR Vault in DR Server.
  • Administration, configuration, troubleshooting and installation of Windows 2003, 2008, 2008 R2 and 2012/R2. Administration of Active Directory 2008, Configured, managed, troubleshot and delegated administrative control to Group Policy Objects.
  • Migrate user accounts into Password Vault using Bulk upload utility.
  • Extensive experience in development, implementation and deployment of Privileged Identity Management suite (CyberArk) for Windows, UNIX and Database servers.
  • Developed and maintains system security plans and contingency plans with the major applications.
  • Performed Manage, Resume, Release Privileged Credential using CyberArk Privileged Management vault.
  • Ensured that system security plans and contingency plans are developed and maintained for each system and applications, and ensured systems personnel are properly designated, and trained.
  • Managed Safes and Server/ host addresses in Enterprise Password vault. Resolved issues in CyberArk’s Central Password Manager to communicate with hosts to reconcile credentials.
  • Provided guidance in addition, removal, change and lifecycle of Privileged ID Management (PIM) in order to provide the highest quality levels of Security.
  • Configured fiber and iSCSI storage in VMWare Hosts and virtual machines.
  • Administration and configuration of Red Hat Linux.
  • Exposure to Identity and Access management Tools like Pharos.
  • Highly self-motivated and goal-oriented professional committed to pursuing a long-term career.
  • Experience in .Net Framework 3.5, 4.0, C# Programming, ASP.Net Web development through MVC3.
  • Experienced in working with Core Java and JavaScript.
  • Proficiency in programming with different Java IDE's like Eclipse, RAD and Net Beans.
  • Insight into Java/J2EE technologies such as Core Java, Servlets, JSP, JDBC, spring, Hibernate.
  • Good experience with version controls like SVN, GIT & CVS.
  • Outstanding communication and interpersonal skills, ability to learn quickly, high compliance to new technologies and tools.

TECHNICAL SKILLS:

Security Tools: CyberArk 7.0/ 8.1.0/9.2.1 PIM, QualysGuard, Symantec ESM, Sailpoint IIQ, ESSO, OKTA, Datasecure, Safeword, etoken, LDAP, AD Integration, AIM, OPM, LTM, GTM

Project Management: MS-Project

Programming & Scripting Languages: JSQL, PL-SQL, Unix Shell Scripting, C, Java, JavaScript, Servlets, JSP, JSF, Apache Struts, Junit

Reporting Tools: Qlik View, Qlik Sense, Tubule, SOAP UI

IDE/GUI: Eclipse, IntelliJ IDEA, Net Beans, Visual Studio.

Database: Oracle 8i/9i/10g, SQL Server, DB2 9.5

Other Tools: Wireshark, Cisco Packet Tracer

Operating Systems: Window10, Windows 8, Windows 7, Windows Server2008/2003, Mac OS, Ubuntu, Linux, UNIX

WORK EXPERIENCE:

Confidential, Chattanooga, TN

CyberArk Analyst

Responsibilities:

  • Involved in application to application credential management.
  • Configured and setup ISIM environment in clusters.
  • Implementation and installation of CyberArk 7.0 and latest implementation of CyberArk 8.1.0. and CyberArk 9.7
  • Worked on Privileged Account Management with CyberArk PIM suite Administration.
  • Defined user account settings through Active Directory and usedActiveDirectoryto create, modify, and manage user, computers, and group account.
  • Experience in performing Privileged Account Management with fair understanding the underlying business processes.
  • Integrated with Active Directory (LDAP), 2 Factor Authentication (RADIUS).
  • Installed, configured disaster recovery Vaults and DR services.
  • Implemented ISIM as a part of identity access management program.
  • ISIM integration with Active directory for provisioning and de-provisioning the users.
  • Responsible for determining the target Privileged Session Management (PSM) audience. Determine what infrastructure and systems PSM will target (servers, virtual servers, database).
  • Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
  • Configured platforms, master policies, created Safes & On-Boarded Privileged Accounts, connection components, transparent components, access control through AD Group Nesting's.
  • Daily administration and maintenance of company's E-Directory.
  • Creation of policies and reports in PVWA.
  • Administration experience of CyberArk vault with Safe creation, integration with LDAP and other authentication methods.
  • Defined, developed, and documented IDAM services including Single Sign-on, Self-Service registration, workflows, user management, management dashboard, Role Base Access Control (RBAC), Attribute Base Access Control (ABAC), resource and business layers Provisioning, credentialing, federation, and auditing.
  • Maintain development, testing, and production systems. Coordinate maintenance with support teams.

Environment: CyberArk 9.0, Apache Directory Studio, Service Now, MS -Office Suite of products.

Confidential, Seattle, WA

CyberArk Analyst

Responsibilities:

  • Test script, Test scenarios and conditions DR fail over scenarios for Implemented servers.
  • Perform Penetration testing and vulnerability assessment to improve application security.
  • Involved in Technical Requirements Gathering from the client and worked with server teams for permission requirements.
  • Involved in Installation and configuration of CyberArk 7.0/8.0.1 PIM, Vault and Vault Client, Central Password Manager, Password Vault Web Access, Privilege Session Manager.
  • Mentor to all the other team members in the team and working as the point of contact for Enterprise Password Vault and Identity Access Management.
  • Configuration, Password Management, Password/Web Policies for Multiple Privilege Accounts across the organization for CPM component.
  • Reconciliation, Password Synchronization, Service definition for Target System, Workflows
  • User On-Boarding through Pharos as per client liaison.
  • OPM and AIM provider Installations on PSM and testing for Installation Qualification.
  • Involved in AD integration and adding user to with their privileges.
  • Integrate Windows, UNIX and Database accounts with PIM.
  • Extensively involved Project purpose all Installation guide and document for End User training material, PPT.
  • Extensively involve for making Daimler Password Vault Environment up and running.
  • Implemented Session recording and live monitoring in several critical servers.
  • Worked with client engineering groups to create, document, implement, validate, and manage policies, procedures, and standards that ensure confidentiality, availability, integrity, and privacy of information.
  • CyberArk Vault Maintenances, 2FA troubleshooting, accesses and authentications, SAPM troubleshooting & repairs, SUPM user’s authentications and maintenances.
  • Enhanced the process for Enterprise Password Vault based on customer feedback.
  • Supported Identity Access Management.
  • The application was deployed on WebLogic and was used by all enterprise users to automate the onboarding process for Enterprise Password Vault.

Environment: CyberArk9.1, Apache Directory Studio, Replicate, MS - Office Suite.

Confidential, NY

CyberArk Admin

Responsibilities:

  • Responsible for determining the target Privileged Session Management (PSM) audience. Determine what infrastructure and systems PSM will target (servers, virtual servers, database).
  • Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
  • Extensively involved Project purpose all Installation guide and document for End User training material, PPT.
  • Configuration, Password Management, Password/Web Policies for Multiple Privilege Accounts across the organization for CPM component.
  • Involved in Installation and configuration of CyberArk 7.0/8.0.1 PIM, Vault and Vault Client, Central Password Manager, Password Vault Web Access, Privilege Session Manager.
  • Implementing and managing master policy, directory mapping, LDAP Integration, platform as per the Project requirement. Reported and Visualized Threats by CyberArk, windows & UNIX platform.
  • Test script, Test scenarios and conditions DR fail over scenarios for Implemented servers.
  • Extensively involve for making Daimler Password Vault Environment up and running.
  • Migrate user accounts into password vaulting tool.
  • Troubleshooting and maintenance of the password vaults.
  • Installed, configured disaster recovery Vaults and DR services.
  • Provide user support for CyberArk when necessary.
  • Using CyberArk services, adding, delete and modify users, groups and group Memberships.
  • Maintain development, testing, and production systems. Coordinate maintenance with support teams.

Environment: Windows Servers, Linux Servers, Active Directory, Exchange Server, Security Tools

Confidential

Network Security/ Firewall Engineer

Responsibilities:

  • Involved in Data Center migrations. Handled proper management, maintenance, configuration, and altered management of firewall structure.
  • Responsible for setting up Web Application Firewalls (WAF) like SQL injection, http conversation.
  • Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies.
  • Configured, administered and troubleshot the Checkpoint and ASA firewall.
  • Configured Cisco ASA and Checkpoint firewall layers to secure the infrastructure for the Data Center.
  • Worked on the Juniper environment including SRX/Junos Space.
  • Configured Juniper NetScreen Firewall Policies between secure zones using NSM (Network Security Manager).
  • Configured and set up DMVPN, GRE based VPN on Cisco-IOS based router.
  • Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
  • Used Qualys Tool for network discovery and mapping, asset prioritization, vulnerability assessment and tracking.
  • Worked on McAfee Data loss prevention endpoint (DLP).
  • Configured Active Directory and LDAP over different forests and across multiple domains.
  • Worked on checkpoint provider R71, R75, R77.1, R77.30 GAIA and secured policies and blocked websites using URL filtering, application identification and threat prevention.
  • Configured VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches.
  • Involved in Qualys policy compliance in detecting internal and external threats and vulnerability.
  • Tuned BGP internal and external peers with manipulation of attributes such as weight, local preference.
  • Defined and maintained Active Directory (LDAP) security models.
  • Worked on Check Point GAIA Firewalls R65, R70, R71, R75, R77.
  • Upgraded Checkpoint firewalls and management servers from Splat R75.30 to Gaia R77.20.
  • Configured Cisco ASA and Checkpoint firewall layers securing existing Data Center infrastructure. Migrated information securityfrom Cisco PIX to ASA5500 with LAN-failover platform.
  • Responsible for the Windows environment, including backup, disaster recovery and network Security.
  • Installed and configured Checkpoint Firewall in Internet Edge.

Environment: Windows Servers, Linux Servers, Active Directory, Exchange Server, Security Tools

Confidential

Java Developer

Responsibilities:

  • Involved in the design and implementation of the architecture for the project using OOAD, UML Design Patterns
  • Responsible for providing high level systems design; this includes specifying the component packaged and custom applications, class diagrams, E-R diagrams, class diagrams, sequence diagrams, activity diagrams, etc.
  • Used Java/J2EE Design Patterns - DAO Pattern, Transfer Object, and MVC at various levels of the application and J2EE Frameworks - JSF, spring, Rich faces, JPA, and Hibernate.
  • Expertise in developing JSP's, Servlets and EJB's and has in-depth knowledge in content management.
  • Involved in design and developmentJava Transfer Objects (JTO).
  • Implemented validation of client-side data with JQuery and JavaScript.
  • Involved in the design, development and maintenance of the Front-end for the application using JSP, JSTL, Custom Tags and have strong HTML, XML, AJAX, JavaScript and CSS skills.
  • Developed and implemented an asynchronous, AJAX based rich client for improved customer experience and used DOJO JavaScript libraries.
  • Involved in writing stored procedures for Backend database.
  • Used JDBC to interact with the database layer of the Application.
  • Involved in setting up the Web Services (SOA) using XML, SOAP, WSDL and Apache Axis2 and created Consumers and Stubs to get the required information for policies using RAD 6.5
  • Developed the Business logic using spring (IOC, AOP), DTO, and JTA.
  • Used Java Messaging Services (JMS) for reliable and asynchronous exchange of important information such as payment status report.
  • Developed agile processes using Groovy, JUnit to use continuous integration tools.
  • Reviewed existing code and recommended effective coding standards for code reuse and performance by making effective use of various designs patterns.
  • MappingJava Classes to Database tables and leverage data query, retrieval and storage features of Hibernate.

Environment: Java/J2EE 1.6, JSP, Eclipse 3.0, JavaScript, Servlets, Oracle 11g, Groovy, Grail, Hibernate, Tomcat server, Apache Tomcat, Maven, SVN, Windows XP

We'd love your feedback!