We help our clients leverage technology to achieve their business goals. Our Cyber Security consultants leverages technologies of trusted to help clients control which employees, partners, suppliers, customers, and citizens have access to sensitive organizational applications and data. We also focus on the integrations of cutting-edge technologies in the cyber security space. * 2-3 years of experience in operating Privileged Access Management (PAM) technologies, such as CyberArk, BeyondTrust, Thycotic (Delinea), Wallix or other * Awareness on integration with various technologies such as Service Now, VMWare and IAM solutions * Good understanding of security concepts and technologies in the wider Identity and Access Management space (IAM): Logical Access Controls, LDAP
more