Knowledge of IT Operations, infrastructure services support (Systems NT, UX, Storage, Backups, DBs or Network management), security incident and security processes
Understanding of ITSM/ITIL processes
Detailed knowledge and working experience with:Design, Implementation & Deployment of CyberArk on Premise and SaaS Environments - Assessing and troubleshooting CyberArk and other PAM solution installations - Assisting in the daily operations of CyberArk and other PAM solutions - Execution of daily tasks, support tickets, and provisioning tasks as assigned or routed via the ticketing system - Applies knowledge, skills and abilities to implement a process or procedure, timely and professionally. - Responsible for Privileged User account administration of various Windows and UNIX accounts using CyberArk components. - Integrating various platforms with CyberArk, such as different LDAP providers, Windows servers, UNIX servers, Databases and networking Devices. - Creating and Managing Safes, Platforms and Owners. - Central Policy Manager (CPM) policies management or redistribution. - Perform health check monitoring on all CyberArk severs to ensure consistent availability of the system to end-user. - Ability to document installation procedures, Standard Operating Procedures (SOP), etc. - Extensive experience with digital password vaulting solutions - Experience in programming (Perl, Python, PowerShell, Administrative scripting) a plus - Basic understanding of high-availability (HA) and failover implementations for network infrastructure and server systems - Providing an overview of CyberArk and equivalent Privileged Access Management solution capabilities - CPM Plugins and PSM connector Build and Customization skills - Communicates project status and escalates issues as needed.- Execution of project tasks during engagement activities - Works on special projects as assigned.Education (degree) and professional experience required:
University Degree in Computer Science, Computer Engineering, Electronics/ Electrical Engineering or equivalent
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available .