Privileged Access Management; PAM Architect; Remote
Austin, Travis County, Texas, 78716, USA
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Crowd Strike, Inc.
Full time
R26244
As a global leader in cybersecurity, Crowd Strike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed — we're here to stop breaches, and we've redefined modern security with the world's most advanced AI-native platform. Our customers span all industries, and they count on Crowd Strike to keep their businesses running, their communities safe and their lives moving forward.
We're also a mission-driven company. We cultivate a culture that gives every Crowd Striker both the flexibility and autonomy to own their careers. We're always looking to add talented Crowd Strikers to the team who have limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters?
The future of cybersecurity starts with you.
The Lead PAM Architect will be the technical leader responsible for designing, implementing, and maintaining the comprehensive PAM architecture strategy and systems across the Crowd Strike enterprise and the Falcon platform. This role demands extensive experience in securing privileged access, managing secrets, reducing risk, and ensuring compliance with industry regulations. The ideal candidate will guide implementation teams, mentor junior staff, and collaborate with cross‑functional partners to mitigate risks and enhance the organization's security posture.
They will be empowered to make decisions, apply their deep expertise, and have their voice heard. They will be trusted to get the job done and chase our mission without someone looking over their shoulder.
What You’ll Do:- Strategy and Design:
Develop and document a comprehensive PAM architecture strategy and roadmap that aligns with organizational objectives, enables users to get work done, and reduces security risk. - Solution Implementation:
Lead the design, development, and deployment of robust PAM solutions, including workload access controls, secrets management, and endpoint privilege management. - Technical Leadership:
Act as a subject matter expert (SME) and technical leader for the PAM team, providing guidance, validation, and quality control for implementation and integration efforts. - Platform Management:
Leverage expertise in PAM tools such as Beyond Trust, Delinea, Hashi Corp Vault, as well as custom on‑premises tools to enhance security measures and streamline access management processes. - Policy and Compliance:
Design, implement, and enforce access control policies, standards, and procedures for privileged accounts, ensuring consistent and secure management and compliance with regulatory requirements (e.g., NIST, ISO 27001, PCI DSS, HIPAA, FedRAMP, DoD IL). - Collaboration and Integration:
Partner with product engineering, IT operations, security, and compliance teams to ensure seamless integration of PAM solutions with existing systems (e.g., Active Directory, SIEM tools, cloud platforms, microservices). - Risk Management:
Conduct regular assessments of PAM controls, analyze complex access control scenarios, and collaborate with business partners to identify and mitigate risks associated with privileged access. - Mentorship and Training:
Mentor and coach team members, fostering a culture of continuous learning and professional growth within the organization. Participate in interviewing and hiring technical talent. - Troubleshooting:
Lead the testing, troubleshooting, and resolution of complex technical issues across multiple layers to ensure successful deployment and ongoing operation of PAM systems.
- Experience:
10+ years of experience in the IT industry, with a minimum of 5 years specifically in Privileged Access Management architecture and design. - Technical Expertise:
Deep technical understanding of PAM capabilities, controls, and security technologies, including privileged account discovery, session management, JIT and Dev Ops secret management. - PAM Tools:
Hands‑on, expert‑level experience with enterprise PAM platforms (e.g., Cyber Ark, Delinea, Beyond Trust). - Identity & Access Management:
Expert experience in core IAM…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).