IB

Security Consultant - CyberArk

IBM
Mumbai5-15 LPA Posted 13 Nov 2025
FULL TIME
Incident Management
Endpoint Security
Cyberark

Job Description

Job Responsibilities:

  • Supervise and mentor a team of CyberArk support professionals, fostering collaboration and skill development
  • Oversee the operational aspects of CyberArk solutions, ensuring 24/7 availability, scalability, and optimal performance
  • Lead the resolution of CyberArk-related incidents and problems, coordinating with technical teams and stakeholders to ensure timely and effective solutions
  • Collaborate with the security team to implement and enhance security controls, policies, and procedures for privileged access management
  • Monitor system performance, conduct regular health checks, and proactively identify and address potential performance bottlenecks
  • Plan and execute system upgrades, patches, and enhancements, ensuring minimal disruption to ongoing operations
  • Maintain thorough documentation of configurations, processes, and procedures related to CyberArk operations
  • Coordinate with CyberArk vendors for support, troubleshooting, and escalations to ensure timely issue resolution
  • Drive continuous improvement initiatives to enhance the effectiveness and efficiency of CyberArk operations
  • Generate regular reports on system performance, incident management, and operational metrics for management review
  • Willing to work in 24/7 operations and project support activities

Required Education:

  • Bachelor's Degree

Preferred Education:

  • Master's Degree

Required Technical and Professional Expertise:

  • Proven experience in CyberArk operations and support, with a minimum of 4+ years of hands-on experience
  • Professional certifications such as CyberArk Certified Trustee (CCT) or Certified Delivery Engineer (CDE)
  • Strong knowledge of privileged access management concepts and CyberArk technologies
  • Experience in organizations to control, monitor, and secure privileged access across their IT infrastructure
  • Good exposure in endpoint
  • Analytics capabilities to identify unusual or suspicious activities related to privileged access

Join WhatsApp Channel