Deloitte Jobs

Job Information

Deloitte Advisory - Cyber & Strategic Risk - Cyber Identity - CyberArk Manager in Columbus, Ohio

Cyber Privileged Access Management CyberArk Manager

Are you interested in working in a dynamic environment that offers opportunities for professional growth and new responsibilities? If so, Deloitte & Touche LLP could be the place for you. This is an unparalleled time of change with new information security challenges arising each day. Our team of Cyber risk professionals bring industry experience, confidence, and technical knowledge to help our clients tackle those unique challenges.

The recruiting for this role ends on 31 st March, 2024.

Work you will do:

As Privileged Access Management (PAM) CyberArk solutions Manager, you will

  • Be the Project Manager overseeing teams for the day-to-day activities of PAM client engagements that identify, design, and implement technology and creative business solutions for large companies. Responsibilities include, among others, managing teams in the identification & delivery of business requirements, functional design, process design (including scenario design, flow mapping), prototyping, testing, training, defining support procedures.

  • Prepare and present oral and written reports and presentations.

  • Develop and maintain Cyber client relationships, ensure client satisfaction and expand existing Cyber engagements.

  • Lead aspects of the proposal development process and Request For Proposal (RFP) responses, pricing strategies, engagement letters and Statements of Work.

  • Perform role of counselor and coach; provide input and guidance into the staffing process; actively participate in staff recruitment and retention activities; provide leadership and support for delivery teams and staff in local offices.

  • Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards.

  • Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement.

  • Responsible for design, implementation and deployment of PAM solutions.

  • Responsible for PAM strategy and roadmap development including vendor assessment and capability evaluation of PAM technologies.

  • Establish continual service improvement plan for PAM focusing on operational, process and resource efficiency.

  • Communicate to clients and partners aspects of both the product and the implementation at the technical and functional level appropriate for the situation.

  • Identify opportunities to improve engagement profitability.

The Team

Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation, and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory’s Cyber Risk Services practice.

Qualifications

Required:

  • BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business, or relevant fields.

  • Overall 7+ years of industry experience within IT in developing, implementing, or architecting PAM solutions in accordance with industry best practices and organization requirements.

  • At least 3+ years of experience managing projects through the full system development lifecycle for PAM solutions.

  • At least 3+ years of hands-on experience with privileged access management program, specifically familiar with CyberArk solutions i.e., Core Privileged Access Security, Endpoint Privilege Manager Application Access Manager, Enterprise Password Vault (EPV), Password Vault Web Access (PVWA), Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Session Management Proxy (PSMP), Privileged Threat Analytics (PTA), Connectors.

  • Hands on experience working with multiple operating systems, application servers, databases, and other core infrastructure.

  • Experience in creating strategies for management of secrets, privileged accounts, and session monitoring to ensure robust security posture.

  • Experience in planning and execution of roadmaps and technology enhancements for PAM projects.

  • Experience with conducting PAM architecture assessments / system audits to ensure current implementations align with industry guidelines, best practices, and management approved standards to meet compliance and regulatory requirements.

  • Provide PAM specialist experience for day-to-day system development, engineering, decision making, directions and maintenance activities of the team.

  • Partner with PAM core team stakeholders in implementation of processes per the evolving needs of the team and the solutions.

  • As needed, collaborate with business and technical partners to identify, and scope the PAM opportunities, quantify costs, outline potential value and Return on Investment (ROI), identify risks, benefits, and constraints.

  • Experience with interpretation and analysis of corporate security standards and baselines along with developing cybersecurity policies.

  • Provide training and technical guidance to security operations, application owners, and IT staff. Experience in collaborating with cross-functional teams to understand business requirement.

  • Manage and mitigate risks associated with privileged accounts by enforcing principles of least privilege.

  • Ability to travel 25-50%, on average, based on the work you do and the clients and industries/sectors you serve.

  • Ability to communicate effectively to globally diverse teams using written communications, in-person, as well as over voice and video.

  • Limited immigration sponsorship may be available.

Preferred:

  • Previous Consulting or Big 4 Project Management experience preferred.

  • Certifications such as: CISSP, CISM, or CISA certification a plus.

  • Understanding of Cloud technologies (Google Cloud Platform, Azure, or AWS).

  • Familiarity with SCIM and knowledge of various API authentication standards.

  • Experience across core IAM domains like Identity Governance and Administration and Access Management

    The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $124,616 - 240,488.

You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any depends on various factors, including, without limitation, individual and organizational performance.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

DirectEmployers