CyberArk Engineer

London
1 month ago
Applications closed

Related Jobs

View all jobs

CyberArk Security Analyst

IAM/PAM Security Analyst - CyberArk - 100 Remote

IAM Governance Manager

We are working with a leading global consultancy that are on the lookout for a CYBERARK ENGINEER that has expertise with PTA (privileged threat analytics) and EPM (End point manager).

Role: CyberArk Engineer

Location: Glasgow / London

Style: Hybrid – 2/3 days onsite

Rate: Up to £500 per day (inside IR35)

Duration: 6 months (initially – view to extend)

Role Description

  • The Privilege Access Engineering team is responsible for engineering and developing cyber security controls for privileged access.

  • The team's focus is on identity assurance, accounts/secrets management, and monitoring/detective controls.

  • We look to continuously improve our capabilities for defense against environmental exploitations, persistent attacks, and insider threats.

    Key responsibilities

  • Design and implement privileged access management solutions for broad platform and service coverage

  • Working with clients to determine their requirements

  • Assist with product deployment, enhancements, and integration

  • Provide L4 escalation support

  • Work closely with operations partners in the same squad to implement solutions for the Firm

    Key Skills:

  • Expertise in Windows Server operating system

  • Experience working with CyberArk EPM and PTA

  • Experience with cybersecurity solutions

  • Solid PowerShell scripting or C#/.NET knowledge

  • Excellent conceptual, organizational, analytical, and problem-solving skills

  • Excellent written and oral English communication skills and ability to work with globally distributed teams and users

  • Ability to learn product capabilities as implemented in the Firm, and learn about firm practices and procedures

  • Knowledge of privileged access management solutions (e.g. CyberArk PAS, Hitachi ID, BeyondTrust, Avecto, CyberArk EPM, etc.)

  • Familiarity with automation tools, such as Ansible, Puppet, or Chef

  • Expertise in Unix/Linux

  • Knowledge of Microsoft Active Directory / Group Policy

  • Knowledge of development practices and processes (source control, deployment processes and automations)

    If you are interested and have the relevant experience, please apply promptly and we will contact you to discuss it further.

    Yilmaz Moore

    Senior Delivery Consultant

    London | Bristol | Amsterdam

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Cybersecurity Career Myths Debunked: Key Facts for Aspiring Professionals

In a hyper-connected world, cybersecurity is no longer an afterthought—it’s a core component of modern business, government, and everyday life. From stopping ransomware attacks to safeguarding personal data, cybersecurity professionals shoulder a vital responsibility: keeping digital systems, networks, and data safe. Unsurprisingly, the demand for skilled cybersecurity talent continues to surge, offering robust and often lucrative career paths. Yet, despite the industry’s prominence, myths and misconceptions about cybersecurity careers abound. Is it really just about hacking? Do you need to be a superhuman coder with years of experience? Or is cybersecurity just a niche field, reserved for tech giants? At CyberSecurityJobs.tech, we see firsthand how these myths deter capable individuals from entering or advancing in one of the most dynamic fields in tech. This article aims to bust the top 10 cybersecurity career myths—providing clear, evidence-based insights into what it really takes to thrive in this ever-evolving domain. Whether you’re a recent graduate exploring the field, a mid-career professional seeking a pivot, or simply curious about the prospects, read on to discover the true breadth and promise of cybersecurity careers.

Global vs. Local: Comparing the UK Cybersecurity Job Market to International Landscapes

Understanding opportunities, salaries, and work culture in cybersecurity across the UK, the US, Europe, and Asia Cybersecurity has rapidly ascended from a back-office concern to a strategic priority for every industry. As data breaches, ransomware, and nation-state attacks increase in frequency and sophistication, organisations worldwide are racing to fortify their digital defences. This ongoing surge in cyber threats fuels an unprecedented demand for skilled security professionals—ranging from penetration testers and threat intelligence analysts to cloud security architects and CISOs. In this article, we’ll explore how the UK cybersecurity job market compares to major international hubs in the United States, Europe, and Asia. We’ll discuss job opportunities, salary bands, work culture, and provide guidance for those who might be contemplating remote or overseas positions. By understanding the nuances of each region’s cybersecurity ecosystem, you can make a more informed decision about where and how to advance your career in this high-impact, fast-evolving sector. Whether you’re a seasoned expert with years of experience or a career-changer eager to break into cybersecurity, this overview will help you navigate the global landscape. By the end, you’ll have a clearer perspective on each region’s advantages and challenges—along with practical insights for seizing the best opportunities in a field that has become mission-critical for every modern organisation.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.