RIT Solutions, Inc.
Client: SOAL direct to Enterprise Security client (will mention over phone when we speak next)
Duration: 6 months contact (range of 75 to 80/hr c2c) please see if you can stay in range, if not submit over if you need to (Also, need their full time salary requirements after 6 months if hired on directly) Client: SOAL direct to Enterprise Security client (will mention over phone when we speak next) Location: San Jose, CA on site Must have: Architecting & design of PAM processes, consulting background, good communication skills Certification they will have - Cyberark / Delinea / Beyond Trust
--- Provide expert consulting on privileged access management strategies, policies, and technologies --- Conduct through discovery of privileged access use cases across the organization --- Identify and categorized privileged accounts, applications, and systems that are in scope of PAM --- Work closely with stakeholders (IT Teams, Security Teams, Business Units) to assess and document their needs and security gaps --- Design tailored PAM solutions based on organization's requirements, use cases, and security posture --- Map use cases with PAM solutions and technologies, ensuring solution is scalable, secure and complaint --- Help define, refine, and document PAM strategy --- Experience with industry PAM solutions like CyberArk, BeyondTrust, and Delinea
Duration: 6 months contact (range of 75 to 80/hr c2c) please see if you can stay in range, if not submit over if you need to (Also, need their full time salary requirements after 6 months if hired on directly) Client: SOAL direct to Enterprise Security client (will mention over phone when we speak next) Location: San Jose, CA on site Must have: Architecting & design of PAM processes, consulting background, good communication skills Certification they will have - Cyberark / Delinea / Beyond Trust
--- Provide expert consulting on privileged access management strategies, policies, and technologies --- Conduct through discovery of privileged access use cases across the organization --- Identify and categorized privileged accounts, applications, and systems that are in scope of PAM --- Work closely with stakeholders (IT Teams, Security Teams, Business Units) to assess and document their needs and security gaps --- Design tailored PAM solutions based on organization's requirements, use cases, and security posture --- Map use cases with PAM solutions and technologies, ensuring solution is scalable, secure and complaint --- Help define, refine, and document PAM strategy --- Experience with industry PAM solutions like CyberArk, BeyondTrust, and Delinea