Cyber SDC - Privileged Access Management - Senior
Listed on 2026-01-11
-
IT/Tech
Cybersecurity, Systems Engineer
Location:
Anywhere in Country
At EY, we’re all in to shape your future with confidence.
We’ll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.
In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments.
Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client's unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity.
We currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting‑edge tools and techniques to address some of the most relevant and pressing security challenges in the world.
At our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third‑party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions.
YourKey Responsibilities
- Support the development of privilege and secret access management controls (Cyber Ark, Beyond Trust, Hashi Corp, and Delinea solutions).
- Assist in the design and implementation of privileged access and secret management solutions.
- Participate in requirement gathering and definition of use cases at the enterprise level for privilege and secret management.
- Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (Cyber Ark, Hashi Corp, Delinea, Beyond Trust), including auto‑detection and auto‑onboarding.
- Support onboarding target systems such as Windows, Linux, and Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of Dev Ops solutions (Ansible, Puppet, Jenkins, Kubernetes, Open Shift, Git Hub, Git Lab, Docker).
- Demonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault.
- Assist in defining and implementing vaulting, rotation, and heartbeat policies for human and non‑human identities; enable SSH key and password rotation, check‑out/check‑in, dual control, and break‑glass.
- Participate in the self‑service design and implementation of privilege or secrets lifecycle management using enterprise identity governance solutions (creation, management, certification, deletion).
- Contribute to the development and establishment of governance processes for non‑human identity management.
- Support the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers.
- Proven experience in integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on Cyber Ark (vault, privilege cloud, secure, infrastructure, Endpoint Access Management, and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra.
- In‑depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications.
- Practical expertise in developing Cyber Ark technology tech stack, Hashi Corp Vault, Beyond Trust, and Delinea experience.
- Proficiency in implementing, managing, and maintaining…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).