Qureos

Find The RightJob.

Cyber Security Analyst

Job Details:

Job Title: Cyber Security Analyst (CyberArk with Linux Environments)

Duration: Long-Term Contract

Location: New York, NY || Onsite


Job Description:

Skills/Tools for Position:

Technical Tools:

  • CyberArk (theoretical knowledge for privileged access management).
  • Splunk
  • Active Directory
  • PowerShell
  • Bash
  • Linux administration and troubleshooting


Project Management Tools:

  • Jira and Jira Service Management
  • Confluence
  • Excel and PowerPoint (reporting and presentations).


Soft Skills:

  • Strong communication and collaboration skills for stakeholder engagement.
  • Analytical and problem-solving skills for workflow analysis and testing.


50% of time:

Design and enhance the security of Linux infrastructure by implementing privileged access management (PAM) solutions, securing root accounts, and monitoring privileged user activities.

Responsibilities:

  • Coordinate with the Linux Engineering and CyberArk teams to onboard root accounts into CyberArk, enabling password rotation and secure access.
  • Lead analysis, and testing of PAM solutions to monitor privileged user activities (e.g., users with sudo access) to support compliance and security objectives.
  • Facilitate testing phases for CyberArk PSMP for SSH workflows, gather user feedback, and work with technical teams to refine workflows.
  • Develop project timelines, plans, and workflows for root account onboarding and privileged access monitoring.
  • Analyze server data and audit logs to identify systems in scope and support the implementation of least privilege principles.
  • Plan and execute firm-wide rollout of privileged access solutions, including demos, workshops, and training sessions for Linux teams.
  • Create and deliver PowerPoint presentations to communicate project updates, testing results, and plans to stakeholders.
  • Collaborate with cross‐functional teams to address concerns, gather feedback, and ensure alignment on project goals and timelines.
  • Maintain comprehensive documentation covering workflows, test results, and project updates for transparency and cross‐team alignment.
  • Perform Stakeholder analysis and change impact assessment


30% of time

Deliverable:

Remediate issues identified in SharePoint secure file locations to reduce security risks and ensure credentials are stored securely.

Responsibilities:

  • Review findings from SharePoint and sensitive file share scans to identify files containing clear-text passwords or credential-like content.
  • Work with file owners to remove clear-text passwords and ensure credentials are stored in approved secure solutions, such as CyberArk.
  • Prioritize files for remediation based on risk and accessibility, ensuring the goal of remediating 20% of findings by the end of the year is met.
  • Provide guidance to stakeholders on secure credential management practices and ensure adherence to security and compliance policies.
  • Track remediation progress and provide regular updates to leadership on progress, challenges, and next steps.
  • Develop and maintain documentation, including remediation trackers, progress reports, and project artifacts.


20% of the time

Deliverable:

Support various security remediation tasks and additional documentation needs across identity and access initiatives.

Responsibilities:

  • Provide support for other security-related tasks and projects as assigned.
  • Assist with stakeholder inquiries and troubleshooting related to remediation efforts.
  • Create practice manuals (run books, training videos, develop brown bag sessions)
  • Monitor daily alerts and incidents via Splunk and Service Management tool and perform necessary remediation steps associated with daily alerts and tickets

© 2026 Qureos. All rights reserved.