PAM Security consultant with 10 years+ experience in multiple domains carrying out end to end discovery, analysis, implementation, delivery of industry leading PAM solutions using CyberArk and Beyond Trust enabling client in their PAM journey.
Carrying out projects from requirement gathering, business value proposition, product selection & installation, integration with complex applications.
Wide experience in PAM/IAM/EPM carrying out cloud and on-prem access management, service account management, secret management (App-credentials), connector development, solution implementation, integration with enterprise solutions, Identity Now (access provisioning / deprovisioning) using CyberArk, and other PAM products.
With various project deployment experience in end-to-end PAM product Design & Implementation, Integration with IAM and Security, Configuration, Delivery & Transition of CyberArk PAM.Helped guide clients using experience to enable successful PAM implementation and enablement across industries Structured Lead Consultant with excellent troubleshooting, issue resolution and [Type] skills. Dependable and driven with record seeing complex projects through to completion. Thorough Senior Consultant professional with competency in developing project and implementation plans. Gifted with strong analytical and project management skills. Successful in meeting new challenges and finding effective solutions.
Solution design and deployment of EPM agents on 40k windows- based end points and Mac OS
· Finalized the roadmap and planning for the deployment.
· Enablement of policies e.g., Ransomware, Threat Detection, Removal of local administrators and implement least privilege.
· Enabled JIT SNOW plugin to allow users to get temporary admin access automatically on demand for 1 hour.
· Presented Solution to customer’s ARB (Architect Review Board), SRB (Security Review Board), DSRB (Data Security Review Board) and got the approval.
· Worked with Quest and CyberArk to update the DPA (Data Protection Agreement) document.
· Enabled SSO for EPM console login using Ping Federate
· Mutual exclusion enablement in EPM console as well as with other security solutions as well e.g., crowd Strike
· Set creation for different computer groups based on roles e.g., Developers, Business users etc.
· Policies creation based on events received in EPM console.
· EPM agent upgrade once as available in console
IAM – CyberArk Certified, BeyondTrust Certifed, CyberArk EPM, BT EPM, CyberArk CPC, CyberArk Secret Management
Love to play cricket was a member of college team.