Job Details:
Job Title: Cyber Security Analyst (CyberArk with Linux Environments)
Duration: Long-Term Contract
Location: New York, NY || Onsite
Job Description:
Skills/Tools for Position:
Technical Tools:
-
CyberArk (theoretical knowledge for privileged access management).
-
Splunk
-
Active Directory
-
PowerShell
-
Bash
-
Linux administration and troubleshooting
Project Management Tools:
-
Jira and Jira Service Management
-
Confluence
-
Excel and PowerPoint (reporting and presentations).
Soft Skills:
-
Strong communication and collaboration skills for stakeholder engagement.
-
Analytical and problem-solving skills for workflow analysis and testing.
50% of time:
Design and enhance the security of Linux infrastructure by implementing privileged access management (PAM) solutions, securing root accounts, and monitoring privileged user activities.
Responsibilities:
-
Coordinate with the Linux Engineering and CyberArk teams to onboard root accounts into CyberArk, enabling password rotation and secure access.
-
Lead analysis, and testing of PAM solutions to monitor privileged user activities (e.g., users with sudo access) to support compliance and security objectives.
-
Facilitate testing phases for CyberArk PSMP for SSH workflows, gather user feedback, and work with technical teams to refine workflows.
-
Develop project timelines, plans, and workflows for root account onboarding and privileged access monitoring.
-
Analyze server data and audit logs to identify systems in scope and support the implementation of least privilege principles.
-
Plan and execute firm-wide rollout of privileged access solutions, including demos, workshops, and training sessions for Linux teams.
-
Create and deliver PowerPoint presentations to communicate project updates, testing results, and plans to stakeholders.
-
Collaborate with cross‐functional teams to address concerns, gather feedback, and ensure alignment on project goals and timelines.
-
Maintain comprehensive documentation covering workflows, test results, and project updates for transparency and cross‐team alignment.
-
Perform Stakeholder analysis and change impact assessment
30% of time
Deliverable:
Remediate issues identified in SharePoint secure file locations to reduce security risks and ensure credentials are stored securely.
Responsibilities:
-
Review findings from SharePoint and sensitive file share scans to identify files containing clear-text passwords or credential-like content.
-
Work with file owners to remove clear-text passwords and ensure credentials are stored in approved secure solutions, such as CyberArk.
-
Prioritize files for remediation based on risk and accessibility, ensuring the goal of remediating 20% of findings by the end of the year is met.
-
Provide guidance to stakeholders on secure credential management practices and ensure adherence to security and compliance policies.
-
Track remediation progress and provide regular updates to leadership on progress, challenges, and next steps.
-
Develop and maintain documentation, including remediation trackers, progress reports, and project artifacts.
20% of the time
Deliverable:
Support various security remediation tasks and additional documentation needs across identity and access initiatives.
Responsibilities:
-
Provide support for other security-related tasks and projects as assigned.
-
Assist with stakeholder inquiries and troubleshooting related to remediation efforts.
-
Create practice manuals (run books, training videos, develop brown bag sessions)
-
Monitor daily alerts and incidents via Splunk and Service Management tool and perform necessary remediation steps associated with daily alerts and tickets