Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. Our team is dedicated to enhancing the security programs of our clients so they can mitigate risk, reduce intrusion, and secure information. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Skilled in MS Windows and Linux , Active Directory concepts, including users, computers, groups, policies, and knowledge of Kerberos, LDAP, SSH and public key infrastructures * Good understanding of security concepts and technologies in the wider Identity and Access Management ...
more