×
Register Here to Apply for Jobs or Post Jobs. X

Cyber SDC - Privileged Access Management - Senior

Job in Birmingham, Jefferson County, Alabama, 35275, USA
Listing for: Ernst & Young Oman
Full Time position
Listed on 2026-01-11
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Job Description & How to Apply Below
Position: Cyber SDC - Privileged Access Management - Senior - Location OPEN

Location:

Anywhere in Country

At EY, we’re all in to shape your future with confidence.

We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.

In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments.

Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client's unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.

The Opportunity

We currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting‑edge tools and techniques to address some of the most relevant and pressing security challenges in the world.

At our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third‑party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions.

Your

Key Responsibilities
  • Support the development of privilege and secret access management controls (Cyber Ark, Beyond Trust, Hashi Corp, and Delinea solutions).
  • Assist in the design and implementation of privileged access and secret management solutions.
  • Participate in requirement gathering and definition of use cases at the enterprise level for privilege and secret management.
  • Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (Cyber Ark, Hashi Corp, Delinea, Beyond Trust), including auto‑detection and auto‑onboarding.
  • Support onboarding target systems such as Windows, Linux, and Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of Dev Ops solutions (Ansible, Puppet, Jenkins, Kubernetes, Open Shift, Git Hub, Git Lab, Docker).
  • Demonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault.
  • Assist in defining and implementing vaulting, rotation, and heartbeat policies for human and non‑human identities; enable SSH key and password rotation, check‑out/check‑in, dual control, and break‑glass.
  • Participate in the self‑service design and implementation of privilege or secrets lifecycle management using enterprise identity governance solutions (creation, management, certification, deletion).
  • Contribute to the development and establishment of governance processes for non‑human identity management.
  • Support the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers.
Skills and Attributes for Success
  • Proven experience in integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on Cyber Ark (vault, privilege cloud, secure, infrastructure, Endpoint Access Management, and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra.
  • In‑depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications.
  • Practical expertise in developing Cyber Ark technology tech stack, Hashi Corp Vault, Beyond Trust, and Delinea experience.
  • Proficiency in implementing, managing, and maintaining…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary