Consultant, Privileged Access Management
at CIBC
Toronto, ON, Canada -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 18 Jan, 2025 | Not Specified | 18 Oct, 2024 | N/A | Continuous Improvement,Vulnerability,Investigation,Interpret,Technology,Root,Access,Gap Analysis,Risk Reviews | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
We’re building a relationship-oriented bank for the modern world. We need talented, passionate professionals who are dedicated to doing what’s right for our clients.
At CIBC, we embrace your strengths and your ambitions, so you are empowered at work. Our team members have what they need to make a meaningful impact and are truly valued for who they are and what they contribute.
To learn more about CIBC, please visit
CIBC.com
What you’ll be doing
As a Consultant, Privileged Access Management, you will be joining CIBC’s Cybersecurity, Third Party & Resilience (CTPR) - Privileged Access Management (PAM) team. You’ll be on the front lines of building the future of CTPR at CIBC. As a CTPR Consultant, you’ll assess projects for security risks and present recommendations that allow the business to secure privileged IDs using enterprise vault capabilities. You’ll provide insight and support to our enterprise vault that safeguards our clients, enhance risk management, and enable our success.
At CIBC, we enable the work environment most optimal for you to thrive in your role so you’ll have the flexibility to manage your work activities within a hybrid work arrangement where you’ll spend 1-3 days per week on-site, while other days will be remote.
How you’ll succeed
- Operations – Design PAM processes and strategies to securely manage the privileged ID lifecycle. Implement, configure, deploy, & support PAM solutions. Provide PAM subject matter expertise for business and technical project teams. Coach and serve as a technical escalation resource to team members on all PAM related technical issues. Execute cloud vision by providing technical expertise/guidance in cloud technologies. You will rotate on-call coverage with the rest of the team.
- Security assessments – Leverage your expertise in
Cybersecurity, Third Party & Resilience (CTPR) Management to prepare and conduct assessments for both planned initiatives and unplanned instances. Perform clear and thorough threat and vulnerability scans of internal and external devices. Use your knowledge of processes, tools, techniques, and practices for assuring consistency to standards associated with accessing, altering, and protecting organizational data.
- Consulting – You will be responsible for collaborating with projects and other technology or business partners to create and execute privileged access management for new & existing infrastructure, aligning with Identity & Access Management (IAM) initiatives and related policies, standards, and procedures to help enhance our CTPR posture. Assist other teams in investigation of potential security incidents and provide recommendations to remediate.
- Risk reviews – Examine and interpret requirement documents and architecture diagrams. Collaborate with senior leaders and make informed, risk-based recommendations to enhance information system security. Weigh business needs against security concerns to help guide the business to make practical and informed risk choices.
- Continuous Improvement – You will be well-versed with key Cybersecurity, Third Party & Resilience (CTPR) processes and policies, as well as related operational enterprise processes and policies leveraged across technology. You will recommend solutions to enhance processes, eliminate risks, and improve the speed and quality of key services to our partners. Apply appropriate tools to perform problem determination and root cause analysis; identify bottlenecks, redundancies and vulnerabilities of existing processes as they relate to identity and access management. Conduct gap analysis of existing process/procedures, development/maintenance of clear training/work level instruction documentation, review and update of controls and supporting documentation, coordinate and maintain currency of all knowledge related to the Lifecycle of Privileged Access Management.
Who you are
- You can demonstrate experience in Information security, Vulnerability Management, and application currency initiatives. Familiarity with enterprise change management processes, Jira/Confluence, Cloud Computing technologies, exposure to Agile Development processes, code promotion processes and a CISSP certification is an asset. Troubleshooting complex CyberArk issues and communicating a path to resolution will be an important skillset of a successful applicant.
- You have strong knowledge of a broad set of technology solutions with focus on Windows, Unix, Linux, Active Directory, Azure Active Directory, Azure Key Vault, BIG IP, CyberArk, SailPoint and a background in application support. You must have a minimum of 4-5 years of CyberArk PAM operations and/or infrastructure support experience. Having a history as a developer with experience in various coding languages such as Python, and PowerShell will be beneficial to the role. Being able to work with REST API, understanding how to integrate technologies leveraging REST API and automating manual workflows will be reflective in a skilled candidate.
- You are passionate about people. You find meaning in relationships, and surround yourself with diverse network of partners. You’ll build trust through respect and authenticity.
- You are digitally savvy. You seek our innovative solutions and embrace evolving technologies. You can easily adapt to new tools and trends.
- Your influence makes an impact. You know that peer relationship and networking are essential to success. You inspire outcomes by making yourself heard.
- You give meaning to data. You enjoy investigating complex problems and making sense of information. You are confident in your ability to communicate detailed information in an impactful way.
- Values matter to you. You bring your real self to work and you live our values - trust, teamwork, and accountability.
* Due to the nature of this role, a criminal record check will need to be completed at least annually for the purpose of enhanced screening. *
What you need to know
- CIBC is committed to creating an inclusive environment where all team members and clients feel like they belong. We seek applicants with a wide range of abilities and we provide an accessible candidate experience. If you need accommodation, please contact
Mailbox.careers-carrieres@cibc.com
- You need to be legally eligible to work at the location(s) specified above and, where applicable, must have a valid work or study permit
- We may ask you to complete an attribute-based assessment and other skills tests (such as simulation, coding, MS Office). Our goal for the application process is to get to know more about you, all that you have to offer, and give you the opportunity to learn more about us.
Job Location
Toronto-81 Bay, 17th Floor
Employment Type
Regular
Weekly Hours
37.5
Primary Recruiter
Shipra Jaiswal
Skills
CyberArk Operations, CyberArk Privileged Access Management, Privileged Access Management (PAM
Responsibilities:
Please refer the Job description for details
REQUIREMENT SUMMARY
Min:N/AMax:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Software Engineering
Graduate
Proficient
1
Toronto, ON, Canada