PAM – Security Enterprise Architecture

Freelance Full time in CYARCH - Cybersecurity Architect
  • Share:

Job Detail

  • Work Experience More than 10 years

Job Description

Contexte de la mission

Securing Group privileged user assets, data, and providing privileged users secure access to target IT resource in an auditable manner is the core mission Group Security sponsored Privileged Access Management (PAM) program. The Client Security Departement is looking for a talented individual to design and drive implementation of next generation of Privileged Access Management (PAM) services and infrastructure. Due to ongoing pandemic, remote working and collaboration will be most likely way of working. So it must be possible to deliver work while working remotely .This is a technical role supporting the strategic security initiative of expanding PAM services to meet client Cloud, secrets vaulting to prevent hardcoding of credentials and dev Ops Strategy., The strategic security intitiative aims to strengthening governance in existing CyberArk based PUAM program expand the scope of PUAM program to cover other strategic areas like cloud assets and DevOps components by identifying new use cases, developing design patterns for those use cases



Phase 1:


Identify, evaluate, recommend, develop and validate new PAM use cases, design patterns and standards following industry best practices.

Establish alignment with strategic technology initiatives.

For use cases and design patterns, develop KPI and KRI metrics and alignment with overall client security standards.

Work with the relevant IT and security functions to design, develop, and validate PAM use cases and enhancements in support of cloud and devops environment



Phase 2:


Support proof of concept for identifying next generation of Privileged Access Management (PAM) technologies for managing Privileged user access management in DevOps

Work with the SI/vendor to ensure the use cases, design patterns and principles are properly interpreted and implemented in the PoC

Evaluation of vendor solutions to ensure they meet technology and cloud standards, as well as all applicable architecture considerations and provide final recommendation

Ensure final vendor recommendation is supported by an executive and detailed technical report



Phase 3:


Oversee the execution/implementation of the next generation of Privileged Access Management (PAM) technologies, including owning the overall roadmap, producing regular status updates, and diving deep to resolve issues as they arise



Required skills