At PNC, our people are our greatest differentiator and competitive advantage in the markets we serve. We are all united in delivering the best experience for our customers. As a Cyber Security Consultant within PNC's Security organization, you will be located in Pittsburgh, PA or Cleveland, OH. Remote work with limited travel is an option for a well qualified candidate.
The ideal candidate will have the following experiences:
•Creates and deploys advanced technical controls using the CyberArk Privileged Identity Management (PIM) solution.
•Analyzes, identifies, and remediates privileged access risk throughout electronic systems.
•Onboards groups of privileged accounts into PIM solution.
•Scripting background (Powershell, Batch, Bash, Perl) necessary for utilizing bulk CLI tools and developing custom CyberArk utilities and plugins.
•Familiarity with establishing connectivity using Central Credential Provider and integrating applications with AIM.
•Comfortable with configuring LDAP bind accounts, running Auto Discovery to scan directories and identify unmanaged privileged accounts in scope for onboarding.
•Experience with ServiceNow or related ticketing systems and change control processes to log and respond to incidents.
•Able to perform administrative functions through CyberArk’s internal REST API and assist with developing automation processes using JSON cURL scripts.
•Can develop and effectively enforce quality control measures that adhere audit compliance standards.
•Generate reporting material to satisfy and resolve audit demands
•Provides technical, operational, analytical and research support to technical teams through both written and verbal communications.
•Deploys new, advanced technological solutions to increase efficiency of controls.
•Drives incident resolution and root cause analysis of production problems.
•Tier 3 or 4 support in troubleshooting/support efforts for end users of PIM solution.
•Develops and maintains technical, operational and service procedures, as well as process workflows for operational/applications teams.
•Experience in information security and security principles including access management, administration, control and governance.
•Knowledge of authentication and authorization methods, directories, and separation of duties analysis.
•Experience managing the relationship and interface with internal and external auditors including regulators.
•The ability to maintain project plans, and execute on deliverables.
•Experience with UNIX, Active Directory, eDirectory, networking, and cloud solution is desired.
•Proficient software development/coding is desired.
•A strong understanding of information security related risk, regulatory, audit and compliance experience.
•Strong problem solving ability, organizational and presentation skills.
•Ability to multi-task, prioritize and escalate, where needed.
•The capability to work independently, manage project deadlines with minimal supervision.
•Strong leadership and mentoring skills with excellent communication and collaboration skills.
•A sound decision maker who partners and provides counsel as well as solutions in a dynamic environment.
You will be responsible for managing technical onboarding of privileged accounts and processes to industry strength as well as establish a risk free process to ensure compliance to procedures and technical control standards are aligned. You will attend strategy meetings, and update project documentation. You will also lead collaboration meetings with Stakeholders, build program governance, and work through issues, problem solving, and escalation. You will provide leadership and mentoring to the various administration teams and to ensure consistency and accuracy of requests and suggest modifications to current processes to provide additional technical controls.
Manages Risk - Working Experience
Customer Focus - Extensive Experience
Job Specific Competencies
INFORMATION SECURITY MANAGEMENT - Extensive Experience
IT Standards, Procedures & Policies - Extensive Experience
IT ENVIRONMENT - Extensive Experience
Problem Solving - Extensive Experience
Effective Communications - Extensive Experience
Analytical Thinking - Extensive Experience
Information Security Technologies - Extensive Experience
Network and Internet Security - Extensive Experience
IT SYSTEMS MANAGEMENT - Extensive Experience
Technical Troubleshooting - Extensive Experience
CISA, CISSP, and CISM preferred.
RequiredEducation and Experience
Roles at this level typically require a university / college degree, with 5+ years of industry-relevant experience. Specific certifications are often required. In lieu of a degree, a comparable combination of education and experience (including military service) may be considered.