Cyberark Analyst Resume
Chattanooga, TN
SUMMARY:
- Over 7 years of experience in Software Design and Development with Organizing, Implementations, specialization, and Security.
- Good Involvement in Execution and combination of CyberArk's Privileged Identity Management (PIM) Suite.
- Experience in CyberArk Implementation and Installation on CyberArk 7.0 and most recent Implementation on CyberArk 8.1.0 and CyberArk 9.7
- Installation and capacity management of CyberArk Privilege Session Manager (PSM) including RDS Session host and licensing.
- Installation, configuration and troubleshooting of AIM clients for various teams and Supported Identity Access Management (IAM).
- Installation, configuration and management of MS System Center Configuration Manager 2007/2012(SCCM) infrastructure. Patched servers in pre - prod, Prod and DR environments for approved MS updates.
- Experience with PAM Operational Tasks Defining Access Control, User Entitlements, Manage Applications Credentials and User Access Policy Management.
- Experience in performing Privileged Access Reviews, Compliance Reporting, Access Control Processes and other associated tasks with Privileged User Management.
- Installed, Managed and Troubleshot DNS in multiple zone environments. Troubleshot DNS integration with Active Directory. Installed, configured and administered WINS, DHCP, IIS and WSFTP, File and Print servers.
- Troubleshooting and Maintenance of the Password Vault, CPM, PSM, AIM, DR Vault in DR Server.
- Administration, configuration, troubleshooting and installation of Windows 2003, 2008, 2008 R2 and 2012/R2. Administration of Active Directory 2008, Configured, managed, troubleshot and delegated administrative control to Group Policy Objects.
- Migrate user accounts into Password Vault using Bulk upload utility.
- Extensive experience in development, implementation and deployment of Privileged Identity Management suite (CyberArk) for Windows, UNIX and Database servers.
- Developed and maintains system security plans and contingency plans with the major applications.
- Performed Manage, Resume, Release Privileged Credential using CyberArk Privileged Management vault.
- Ensured that system security plans and contingency plans are developed and maintained for each system and applications, and ensured systems personnel are properly designated, and trained.
- Managed Safes and Server/ host addresses in Enterprise Password vault. Resolved issues in CyberArk’s Central Password Manager to communicate with hosts to reconcile credentials.
- Provided guidance in addition, removal, change and lifecycle of Privileged ID Management (PIM) in order to provide the highest quality levels of Security.
- Configured fiber and iSCSI storage in VMWare Hosts and virtual machines.
- Administration and configuration of Red Hat Linux.
- Exposure to Identity and Access management Tools like Pharos.
- Highly self-motivated and goal-oriented professional committed to pursuing a long-term career.
- Experience in .Net Framework 3.5, 4.0, C# Programming, ASP.Net Web development through MVC3.
- Experienced in working with Core Java and JavaScript.
- Proficiency in programming with different Java IDE's like Eclipse, RAD and Net Beans.
- Insight into Java/J2EE technologies such as Core Java, Servlets, JSP, JDBC, spring, Hibernate.
- Good experience with version controls like SVN, GIT & CVS.
- Outstanding communication and interpersonal skills, ability to learn quickly, high compliance to new technologies and tools.
TECHNICAL SKILLS:
Security Tools: CyberArk 7.0/ 8.1.0/9.2.1 PIM, QualysGuard, Symantec ESM, Sailpoint IIQ, ESSO, OKTA, Datasecure, Safeword, etoken, LDAP, AD Integration, AIM, OPM, LTM, GTM
Project Management: MS-Project
Programming & Scripting Languages: JSQL, PL-SQL, Unix Shell Scripting, C, Java, JavaScript, Servlets, JSP, JSF, Apache Struts, Junit
Reporting Tools: Qlik View, Qlik Sense, Tubule, SOAP UI
IDE/GUI: Eclipse, IntelliJ IDEA, Net Beans, Visual Studio.
Database: Oracle 8i/9i/10g, SQL Server, DB2 9.5
Other Tools: Wireshark, Cisco Packet Tracer
Operating Systems: Window10, Windows 8, Windows 7, Windows Server2008/2003, Mac OS, Ubuntu, Linux, UNIX
WORK EXPERIENCE:
Confidential, Chattanooga, TN
CyberArk Analyst
Responsibilities:
- Involved in application to application credential management.
- Configured and setup ISIM environment in clusters.
- Implementation and installation of CyberArk 7.0 and latest implementation of CyberArk 8.1.0. and CyberArk 9.7
- Worked on Privileged Account Management with CyberArk PIM suite Administration.
- Defined user account settings through Active Directory and usedActiveDirectoryto create, modify, and manage user, computers, and group account.
- Experience in performing Privileged Account Management with fair understanding the underlying business processes.
- Integrated with Active Directory (LDAP), 2 Factor Authentication (RADIUS).
- Installed, configured disaster recovery Vaults and DR services.
- Implemented ISIM as a part of identity access management program.
- ISIM integration with Active directory for provisioning and de-provisioning the users.
- Responsible for determining the target Privileged Session Management (PSM) audience. Determine what infrastructure and systems PSM will target (servers, virtual servers, database).
- Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
- Configured platforms, master policies, created Safes & On-Boarded Privileged Accounts, connection components, transparent components, access control through AD Group Nesting's.
- Daily administration and maintenance of company's E-Directory.
- Creation of policies and reports in PVWA.
- Administration experience of CyberArk vault with Safe creation, integration with LDAP and other authentication methods.
- Defined, developed, and documented IDAM services including Single Sign-on, Self-Service registration, workflows, user management, management dashboard, Role Base Access Control (RBAC), Attribute Base Access Control (ABAC), resource and business layers Provisioning, credentialing, federation, and auditing.
- Maintain development, testing, and production systems. Coordinate maintenance with support teams.
Environment: CyberArk 9.0, Apache Directory Studio, Service Now, MS -Office Suite of products.
Confidential, Seattle, WA
CyberArk Analyst
Responsibilities:
- Test script, Test scenarios and conditions DR fail over scenarios for Implemented servers.
- Perform Penetration testing and vulnerability assessment to improve application security.
- Involved in Technical Requirements Gathering from the client and worked with server teams for permission requirements.
- Involved in Installation and configuration of CyberArk 7.0/8.0.1 PIM, Vault and Vault Client, Central Password Manager, Password Vault Web Access, Privilege Session Manager.
- Mentor to all the other team members in the team and working as the point of contact for Enterprise Password Vault and Identity Access Management.
- Configuration, Password Management, Password/Web Policies for Multiple Privilege Accounts across the organization for CPM component.
- Reconciliation, Password Synchronization, Service definition for Target System, Workflows
- User On-Boarding through Pharos as per client liaison.
- OPM and AIM provider Installations on PSM and testing for Installation Qualification.
- Involved in AD integration and adding user to with their privileges.
- Integrate Windows, UNIX and Database accounts with PIM.
- Extensively involved Project purpose all Installation guide and document for End User training material, PPT.
- Extensively involve for making Daimler Password Vault Environment up and running.
- Implemented Session recording and live monitoring in several critical servers.
- Worked with client engineering groups to create, document, implement, validate, and manage policies, procedures, and standards that ensure confidentiality, availability, integrity, and privacy of information.
- CyberArk Vault Maintenances, 2FA troubleshooting, accesses and authentications, SAPM troubleshooting & repairs, SUPM user’s authentications and maintenances.
- Enhanced the process for Enterprise Password Vault based on customer feedback.
- Supported Identity Access Management.
- The application was deployed on WebLogic and was used by all enterprise users to automate the onboarding process for Enterprise Password Vault.
Environment: CyberArk9.1, Apache Directory Studio, Replicate, MS - Office Suite.
Confidential, NY
CyberArk Admin
Responsibilities:
- Responsible for determining the target Privileged Session Management (PSM) audience. Determine what infrastructure and systems PSM will target (servers, virtual servers, database).
- Installation and configuration of the EPV components (Central Policy Manager, Password Vault Web Access, High Availability Vault Cluster, Secure Zone Access, SAN storage, SSL certificates and Load Balancing.
- Extensively involved Project purpose all Installation guide and document for End User training material, PPT.
- Configuration, Password Management, Password/Web Policies for Multiple Privilege Accounts across the organization for CPM component.
- Involved in Installation and configuration of CyberArk 7.0/8.0.1 PIM, Vault and Vault Client, Central Password Manager, Password Vault Web Access, Privilege Session Manager.
- Implementing and managing master policy, directory mapping, LDAP Integration, platform as per the Project requirement. Reported and Visualized Threats by CyberArk, windows & UNIX platform.
- Test script, Test scenarios and conditions DR fail over scenarios for Implemented servers.
- Extensively involve for making Daimler Password Vault Environment up and running.
- Migrate user accounts into password vaulting tool.
- Troubleshooting and maintenance of the password vaults.
- Installed, configured disaster recovery Vaults and DR services.
- Provide user support for CyberArk when necessary.
- Using CyberArk services, adding, delete and modify users, groups and group Memberships.
- Maintain development, testing, and production systems. Coordinate maintenance with support teams.
Environment: Windows Servers, Linux Servers, Active Directory, Exchange Server, Security Tools
Confidential
Network Security/ Firewall Engineer
Responsibilities:
- Involved in Data Center migrations. Handled proper management, maintenance, configuration, and altered management of firewall structure.
- Responsible for setting up Web Application Firewalls (WAF) like SQL injection, http conversation.
- Drafted, installed, and provisioned ASA and Checkpoint firewall rules and policies.
- Configured, administered and troubleshot the Checkpoint and ASA firewall.
- Configured Cisco ASA and Checkpoint firewall layers to secure the infrastructure for the Data Center.
- Worked on the Juniper environment including SRX/Junos Space.
- Configured Juniper NetScreen Firewall Policies between secure zones using NSM (Network Security Manager).
- Configured and set up DMVPN, GRE based VPN on Cisco-IOS based router.
- Configured and maintained IPSEC and SSL VPN's on Palo Alto Firewalls.
- Used Qualys Tool for network discovery and mapping, asset prioritization, vulnerability assessment and tracking.
- Worked on McAfee Data loss prevention endpoint (DLP).
- Configured Active Directory and LDAP over different forests and across multiple domains.
- Worked on checkpoint provider R71, R75, R77.1, R77.30 GAIA and secured policies and blocked websites using URL filtering, application identification and threat prevention.
- Configured VLAN, Spanning tree, VSTP, SNMP on Juniper EX series switches.
- Involved in Qualys policy compliance in detecting internal and external threats and vulnerability.
- Tuned BGP internal and external peers with manipulation of attributes such as weight, local preference.
- Defined and maintained Active Directory (LDAP) security models.
- Worked on Check Point GAIA Firewalls R65, R70, R71, R75, R77.
- Upgraded Checkpoint firewalls and management servers from Splat R75.30 to Gaia R77.20.
- Configured Cisco ASA and Checkpoint firewall layers securing existing Data Center infrastructure. Migrated information securityfrom Cisco PIX to ASA5500 with LAN-failover platform.
- Responsible for the Windows environment, including backup, disaster recovery and network Security.
- Installed and configured Checkpoint Firewall in Internet Edge.
Environment: Windows Servers, Linux Servers, Active Directory, Exchange Server, Security Tools
Confidential
Java Developer
Responsibilities:
- Involved in the design and implementation of the architecture for the project using OOAD, UML Design Patterns
- Responsible for providing high level systems design; this includes specifying the component packaged and custom applications, class diagrams, E-R diagrams, class diagrams, sequence diagrams, activity diagrams, etc.
- Used Java/J2EE Design Patterns - DAO Pattern, Transfer Object, and MVC at various levels of the application and J2EE Frameworks - JSF, spring, Rich faces, JPA, and Hibernate.
- Expertise in developing JSP's, Servlets and EJB's and has in-depth knowledge in content management.
- Involved in design and developmentJava Transfer Objects (JTO).
- Implemented validation of client-side data with JQuery and JavaScript.
- Involved in the design, development and maintenance of the Front-end for the application using JSP, JSTL, Custom Tags and have strong HTML, XML, AJAX, JavaScript and CSS skills.
- Developed and implemented an asynchronous, AJAX based rich client for improved customer experience and used DOJO JavaScript libraries.
- Involved in writing stored procedures for Backend database.
- Used JDBC to interact with the database layer of the Application.
- Involved in setting up the Web Services (SOA) using XML, SOAP, WSDL and Apache Axis2 and created Consumers and Stubs to get the required information for policies using RAD 6.5
- Developed the Business logic using spring (IOC, AOP), DTO, and JTA.
- Used Java Messaging Services (JMS) for reliable and asynchronous exchange of important information such as payment status report.
- Developed agile processes using Groovy, JUnit to use continuous integration tools.
- Reviewed existing code and recommended effective coding standards for code reuse and performance by making effective use of various designs patterns.
- MappingJava Classes to Database tables and leverage data query, retrieval and storage features of Hibernate.
Environment: Java/J2EE 1.6, JSP, Eclipse 3.0, JavaScript, Servlets, Oracle 11g, Groovy, Grail, Hibernate, Tomcat server, Apache Tomcat, Maven, SVN, Windows XP