Experience Required: 510+ years in Identity and Access Management (IAM), with
deep expertise in CyberArk PAM and EPM
Key Responsibilities:
Architecture & Strategy
Lead the design and implementation of CyberArk PAM and EPM solutions.
Define privileged access policies, least privilege strategies, and endpoint security
controls.
Align PAM/EPM architecture with organizational security goals and compliance
requirements.
Implementation & Integration
Deploy and configure CyberArk components including Vault, PVWA, PSM, CPM,
and EPM.
Integrate CyberArk with Active Directory, LDAP, SIEM, cloud platforms,
and DevOps pipelines.
Customize policies and workflows to meet specific business and security needs.
Endpoint Privilege Management (EPM)
Implement EPM to manage and restrict endpoint privileges across Windows and
macOS environments.
Develop policies to prevent privilege escalation and enforce application control.
Monitor endpoint activity and respond to suspicious behavior or policy violations.
Operations & Support
Maintain and optimize CyberArk environments, ensuring high availability and
performance.
Apply patches, upgrades, and backups regularly.
Troubleshoot issues related to privileged access and endpoint controls.
Security & Compliance
Ensure CyberArk implementations comply with standards like ISO
27001, NIST, HIPAA, and PCI-DSS.
Conduct audits, access reviews, and risk assessments.
Generate reports for internal and external compliance requirements.
Training & Documentation
Provide training and knowledge transfer to internal teams.
Maintain detailed documentation for configurations, policies, and procedures.
Required Skills:
Hands-on experience with CyberArk PAM and EPM modules.
Proficiency in PowerShell, REST APIs, and scripting for automation.
Strong understanding of privileged access governance, endpoint security,
and identity lifecycle management.
Familiarity with SIEM, IAM, and cloud security integrations.
Preferred Qualifications:
Bachelors or Masters degree in Cybersecurity, Computer Science, or related
field.
Certifications such as CyberArk Defender PAM (PAM-DEF) and CyberArk
Defender EPM (EPM-DEF)
Experience with other PAM tools (BeyondTrust, Thycotic) is a plus

Keyskills: Cyberark Identity Access Management IAM Pam Privilege Access Management
At Emerson, we prioritize a workplace where every employee is valued, respected, and empowered to grow. We foster an environment that encourages innovation, collaboration, and diverse perspectivesbecause we know that great ideas come from great teams. Our commitment to ongoing career development and...