Cyber SDC - Privileged Access Management - Senior
Listed on 2026-01-13
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Cyber SDC - Privileged Access Management - Senior
Location:
Anywhere in Country
At EY, we’re all in to shape your future with confidence. We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help build a better working world.
In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in enabling clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to meet each client’s IAM requirements.
This is an opportunity to leverage both technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.
We currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. You will collaborate with esteemed professionals in the cybersecurity industry and learn and apply cutting-edge tools and techniques to address pressing security challenges.
YourKey Responsibilities
- Support the development of privilege and secret access management controls (Cyber Ark, Beyond Trust, Hashi Corp, and Delinea solutions).
- Assist in the design and implementation of privileged access and secret management solutions.
- Participate in requirement gathering and definition of use cases at the enterprise level.
- Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (Cyber Ark, Hashi Corp, Delinea, Beyond Trust), including auto‑detection and auto‑onboarding.
- Support onboarding target systems such as Windows, Linux, Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of Dev Ops solutions (Ansible, Puppet, Jenkins, Kubernetes, Open Shift, Git Hub, Git Lab, Docker).
- Demonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault.
- Assist in defining and implementing vaulting, rotation, and heartbeat policies for human and non‑human identities; enable SSH key and password rotation, check‑out/check‑in, dual control, and break‑glass.
- Participate in the self‑service design and implementation of privilege or secret lifecycle management using enterprise identity governance solutions (creation, management, certification, deletion).
- Contribute to the development and establishment of governance processes for non‑human identity management.
- Support the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers.
- Proven experience integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on Cyber Ark and familiarity with other IAM solutions such as Saviynt, SailPoint, Entra.
- In‑depth knowledge of privilege access management frameworks and ability to guide their integration into existing applications.
- Practical expertise with Cyber Ark technology stack, Hashi Corp Vault, Beyond Trust, and Delinea.
- Proficiency in implementing, managing, and maintaining enterprise‑level privilege access management and secret management tools.
- Solid understanding of enterprise directory services such as Active Directory, Azure AD, and LDAP, plus experience implementing MFA and SSO solutions.
- Strong problem‑solving and analytical skills, with the ability to translate business requirements into technical specifications and execute technical deliveries effectively.
- A track record of delivering high‑quality client services and work products within expected time frames.
- Excellent documentation skills, including the creation of procedures, process documentation, and user documentation related to IAM applications.
- A bachelor’s degree in a related field and…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).