×
Register Here to Apply for Jobs or Post Jobs. X

Cyber SDC - Privileged Access Management - Manager

Job in Fort Worth, Tarrant County, Texas, 76102, USA
Listing for: Ernst & Young Oman
Full Time position
Listed on 2026-01-09
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 60000 USD Yearly USD 60000.00 YEAR
Job Description & How to Apply Below
Position: Cyber SDC - Privileged Access Management - Manager - Location OPEN

Location:

Anywhere in Country

At EY, we’re all in to shape your future with confidence.

We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.

In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM), you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client’s unique IAM requirements.

This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.

The opportunity

We currently offer an exciting career opportunity for a manager responsible for designing, engineering, maintaining, and troubleshooting a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting‑edge tools and techniques to address some of the most relevant and pressing security challenges in the world.

At our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third‑party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions.

Your

Key Responsibilities
  • Develop privilege and secret access management controls Cyber Ark, Beyond Trust, Hashi and Delian solution.
  • Oversea the design and implementation of the privileged access and secret management solution
  • Assist with the privilege and secret management requirement gathering and define the use cases at the enterprise level
  • Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (Cyber Ark, Hashi Corp, Delinea, Beyond Trust), including auto‑detection and auto‑onboarding
  • Manage onboarding of the target systems such as Windows, Linux and Unix accounts, Databases (Oracle, MS SQL, Redish cache) and integration of the Dev Ops solutions such as Ansible, Puppet, Jenkins, Kubernetes. Open Shift, Git Hub, Gitlab, Docker, Ansible platforms
  • Knowledge of the modern cloud vaults such as AWS secret manager and Azure key vault
  • Define and implement vaulting, rotation, and heartbeat policies for human and non‑human identities; enable SSH key and password rotation, check‑out/check‑in, dual control, and break‑glass.
  • Participate in the self‑service design and implementation of the privilege or secrets life cycle management using enterprise identity governance solutions (creation, management, certification, deletion)
  • Develop and establish governance processes for non‑human identity management.
  • Develop policies for the end point management solutions including Windows workstations, Mac OS, Linux and Unix servers
Skills and Attributes for Success
  • Proven experience in integrating, deploying, and configuring PAM and Secret management Technologies, with a strong focus on Cyber Ark (vault, privilege cloud, secure, infrastructure, Endpoint access management and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra
  • In‑depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications.
  • Practical expertise in developing Cyber Ark technology tech stack, Hashi Corp vault, Beyond Trust and Delina experience.
  • Proficiency in implementing, managing, and maintaining enterprise‑level Privilege access management and secret management tools.
  • Solid understanding of enterprise…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary