CYBERARK TECHNICAL SENIOR ANALYST
TOCUMULUS
5 - 10 years
Bengaluru
Posted: 17/12/2025
Job Description
Main Purpose of the Role:
The Cyberark/PAM Technical resource is responsible for management and support of the PAM estate. The role manages the execution of project/product cybersecurity elements across cross-portfolio programs and services.
Executions include working with multiple security, IT and other leadership / stakeholders and a variety of security, IT and engineering technical resources to identify, plan and deliver cybersecurity initiatives. Deliverables include, but are not limited to:
To support the delivery of cyber projects within agreed scope, cost and timescale.
To deliver technical solutions across the Cyber security platform.
To manage and work independently or as part of a team in delivering complex projects.
Key Responsibilities:
For dual hat only:
In this role, you will be responsible for xxx across CLIENTs banking arm and securities business under a dual-hat arrangement. Under this arrangement, you will act and make decisions on behalf of both the bank and the securities business, subject to the same remit and level of authority, and irrespective of the entity which employs you.
In this role, you will be responsible for cybersecurity technical project delivery across CLIENTs banking arm and securities business under a dual-hat arrangement. Under this arrangement, you will act and make decisions on behalf of both the bank and the securities business, subject to the same remit and level of authority, and irrespective of the entity which employs you. Key responsibilities include but, but not limited to:
Interprete cybersecurity relevant regulatory and other requirements or best practices and translate these to business aligned cybersecurity programme requirements.
Manage the delivery of cybersecurity projects within agreed scope, cost and timescale across Bank and Securities.
Support of the delivery of the cyber portion of allocated Cross Portfolio projects including implementation of cyber projects
The technical resource will be responsible for support and execution of the following deliverables as required: business requirements, technical design and architecture, engagement with other infrastructure teams,
Skills and Experience:
Functional / Technical Competencies:
Essential
Responsible for identifying and onboarding (DNA scan/Account discovery module)of privileged accounts into CyberArk across all the platforms.
Minimum 3+ years of CyberArk experience and good knowledge on other PAM tools.
Strong communication skills are critical
Strong understanding of different CyberArk Components like CPM/PSM/PVWA/Vault etc.
Good Understanding of Rest API ( I feel like this should be optional or nice to have)
Good knowledge in CPM Plugin and PSM Connector Development.
Proficient within many LDAP directory style platforms
Basic understanding of Windows Server Administration
Experience in Metrics tools like PowerBI, Tableau etc.(good to have)
Good knowledge in PowerShell scripting.(good to have)
Basic Unix administration knowledge
CyberArk certification or Security related certification.
Develop and Customize CPM plugins and PSM Connectors
Facilitate calls with the end users to explain the importance of management of Privileged accounts
Identify the automation opportunities and work on it.
Ability to create documents of high quality. Ability to work in structured environment and follow procedures processes and policies
Identify area of improvement and propose enhancements to existing environments
Maintain a high level of procedural documentation with the international standards of Quality Management.
Excellent troubleshooting and problem-solving skills
Experience of Information Security, and a solid IT background.
Detailed knowledge of the Access Control and Privileged Access Management domains, including the Tools, Techniques and Procedures used.
Extensive knowledge in CyberArk PAM capabilities protecting Hybrid Environments (On-Prem, AWS, Azure)
Experience in creating detailed work breakdown structure for PAM implementation.
Ability to work with multiple stake holders from Security, Operations, Application Owners and Service
Providers on deployment activities and enhancing the PAM solution.
Clear understanding of Operating systems, Database concepts and others potential targets or endpoints for a typical PAM Solution.
Experience in defining PAM processes and role definition with knowledge of native access control
mechanisms.
Understanding of access control mechanism for Operating systems and Databases and other potential
target devices.
An aptitude and interest for future innovations & technologies as well a willingness to continually learn and nurture those around you
Work Experience:
Essential:
Experience in working on multiple projects with broad scope, ambiguity, and high degree of difficulty
Experience in technology projects such as implementation of Cyber infrastructure replacement etc.
Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Incident Management Possessing high level of analytical ability where problems are typically unusual and difficult
Ability to maintain a working knowledge of cybersecurity principles and elements
Understand global program structure, launch plan and timing, and global program ownership Demonstrable experience of senior stakeholder management and relevant management reporting.
Ability to coach team members through knowledge transfer and constructive feedback
Education / Qualifications:
Minimum 5 years experience in the above-mentioned skillset
Minimum 3+ years of CyberArk experience and good knowledge on other PAM tools.
Personal Requirements:
You are a leader and an expert in delivery of cyberframeworks and associated key solutions
A demonstrable passion for cybersecurity
Excellent communication/leadership/interpersonal skills; results driven and with strong sense of accountability
You are experienced in engaging and persuading teams to accept and participate in best-in-class security
architecture and operations
Data driven, ability to analyze data needed to effectively measure progress against the execution of objectives
You successfully convey technical information in an understandable way that generates results
A troubleshooter who proactively removes roadblocks and pursues solutions to problems that stand in the way
You value and develop trusted relationships at every operational level
The ability to operate with urgency and prioritise work accordingly
Strong decision-making skills, the ability to demonstrate sound judgement
A structured and logical approach to work; Strong problem-solving skills
A creative and innovative approach to work
Excellent presentation skills and excellent attention to detail and accuracy
The ability to manage large workloads and tight deadlines
A calm approach, with the ability to perform well in a pressurised environment
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
