More jobs:
PAM Engineer
Job in
New York City, Richmond County, New York, USA
Listed on 2026-01-15
Listing for:
Intersources inc
Full Time
position Listed on 2026-01-15
Job specializations:
-
Engineering
Cybersecurity, Systems Engineer -
IT/Tech
Cybersecurity, Systems Engineer
Job Description & How to Apply Below
privileged access management (pam) engineer location: nyc ny on-site/remote/hybrid: hybrid 3 days onsite/2 days remote. Duration: 12 months total work hours: 37.5 hours interview process: 1-2 rounds note:
** please note this position will allow consultant to work a hybrid remote schedule. Upon start date consultant will be required to work first month fully onsite. Once work capability is established, consultant will be allowed to work a hybrid remote schedule consisting of 3 days onsite/ 2 days remote. Aslo hours per week is 37.5 no overtime
** position summary: role overview we are seeking a skilled privileged access management (pam) engineer to join our cybersecurity team. This role will focus on securing privileged identities across active directory (ad), entra , linux, and major cloud platforms (azure, aws, and gcp). The pam engineer will design, implement, and maintain controls that ensure administrators and endpoints only have the access they need—at the right time and with the least privilege possible.
The ideal candidate will have strong expertise in vaulting platforms, endpoint privilege management, and zero-trust principles, with a proven track record of reducing attack surfaces and improving identity hygiene. Key responsibilities privileged identity security - administer and enhance the corporate vaulting platform to manage privileged credentials across ad, entra, linux, and cloud platforms (azure, aws, gcp).
- implement credential randomization for local/built-in administrator accounts, service accounts, and cloud root/admin accounts.
- ensure time-bound, approval-based access for administrators following least privilege and just-in-time (jit) principles. Endpoint privilege management - implement and maintain endpoint least-privilege policies across windows, linux, and macos environments.
- replace standing local admin rights with controlled privilege elevation workflows.
- apply application control and privilege granularity to reduce risks from malware, ransomware, and insider threats.
- partner with desktop engineering teams to improve usability while enforcing strong endpoint controls. Identity hardening & hygiene - lead local administrator cleanup projects and enforce removal of unauthorized admin rights.
- harden entra cloud tenant hygiene by monitoring stale accounts, privileged roles, and excessive permissions.
- apply itdr (identity threat detection & response) practices to detect and mitigate suspicious privileged activity across on-prem and cloud platforms. Security architecture & standards - contribute to enterprise zero trust architecture initiatives for hybrid and multi-cloud environments.
- align privileged access controls with nist standards and organizational policies.
- drive adoption of passwordless authentication, mfa, and sso for both on-prem and cloud privileged identities. Cloud identity & access - manage and monitor privileged roles and accounts in azure ad (entra ), aws iam, and gcp iam.
- implement least-privilege design for cloud workloads, service principals, keys, and secrets.
- integrate cloud platform identities with pam vaulting, session recording, and access approval workflows. Identity lifecycle management - collaborate with iga teams to automate provisioning, deprovisioning, and recertification of privileged accounts across on-prem and cloud.
- ensure privileged entitlements are tied to clear business justification and ownership. Documentation & governance - create and maintain technical runbooks, architecture diagrams, and operational procedures.
- provide reporting on privileged access usage, endpoint privilege management, hygiene metrics, and compliance results.
- partner with audit, compliance, and risk teams to demonstrate control effectiveness. Required qualifications - 3–5+ years of experience in pam, iam, or related security engineering roles.
- hands-on experience with ad, entra , linux, and at least one major cloud platform (azure, aws, or gcp).
- strong knowledge of vaulting technologies and endpoint privilege management practices (least privilege, privilege elevation, application control).
- proficiency with authentication methods: mfa, sso,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×