Eaton’s Information Technology division is currently seeking a Privilege Access Management – Specialist to join our team. This position can be based at any Eaton office location in the U.S. The position is eligible for a hybrid work setup.
The expected annual salary range for this role is $101,250 – $150,000 a year.
Please note the salary information shown above is a general guideline only. Salaries are based upon candidate skills, experience, and qualifications, as well as market and business considerations.
What you’ll do:
Position Overview:
Join Eaton’s Information Technology team and help positively impact our business through leading technologies, exciting and challenging enterprise projects, and new platforms. We are transforming into a Product-Centric Organization utilizing Agile practices to help us work more incrementally and fluidly, allowing us to respond more quickly to changing business needs.
In this function, you will:
- Build, deliver, maintain, and update technology, platform, and system solutions in Eaton’s Identity and Access Management space that addresses business and technical requirements, leveraging standard principles and patterns.
- Focused on delivering, maintaining, and updating Privileged Access Management systems with a targeted focus on the Saviynt (CPAM) platform.
- Provides subject matter expertise to and leads platform and system design, development, and implementation
- Leads overall effort and works with resources across functions to deliver technology, platform and system solutions to meet customer requirements, providing solution options, making recommendations, and highlighting operational or security risks, as well as providing alternative options.
- Defines tuning and configuration parameters/settings for technologies, platforms and systems to meet customer and operational requirements.
- Leads lifecycle management activities for technology, platform, systems and related documentation to ensure operational health and security.
- Monitors technology, platform and systems to ensure required performance, availability, and capacity. Identifies and eliminates gaps in monitoring and potential impact on service delivery.
- Continuously seeks to more efficiently manage and utilize technology, platform and systems.
- Follows industry, organization, and ITIL best practices to maximize quality and efficiency
Qualifications:
Required (Basic) Qualifications:
- Associate degree from an accredited institution
- Minimum of 5 years in Cybersecurity
- Must be legally authorized to work in the United States without company sponsorship now or in the future.
- This position requires use of information or access to hardware that is subject to the International Traffic in Arms Regulations (ITAR). All applicants must be U.S. persons within the meaning of ITAR. ITAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. ‘Green Card Holder’), Political Asylee, or Refugee.
Preferred Qualifications:
- Bachelor’s degree from an accredited institution
- Experience with Saviynt CPAM, CyberArk EPM, or other endpoint privilege management solutions, IGA concepts, demonstrating technical knowledge with local credential management on Windows and Mac endpoints.
- Secrets Management & Non-human identity governance best practices
- Managing Privileged Accounts and APIs in Cloud Providers (Azure, AWS, GCP)
- Developing integrations between PAM and IGA solutions
Skills:
Position Criteria:
- Experience in Identity and Access Management solutions and technologies. Experience with Saviynt EIC (preferred) or other modern IGA solutions, including onboarding and troubleshooting enterprise-scale application integrations and Privileged Access Management best practices.
- Experience architecting privileged access management solutions using Saviynt CPAM (preferred), CyberArk, or other industry-leading PAM solutions.
- Must be able to demonstrate a firm understanding of the concepts of password vaulting, privileged session management, secrets management, and DevSecOps
- Privileged Access Management best practices
- Active Directory administration and familiarity with domain/forest topology
- Linux administration & security concepts
- Windows administration & security concepts
- SSH connectivity / SSH key management best practices
- PowerShell scripting and security
- High Availability / Disaster Recovery terms and concepts
- Application Identity Manager / Credential Provider / Central Credential Provider
- Experience with securing RPA use cases and workloads, demonstrating best practice concepts in securing credentials in Automation Anywhere (preferred) or other RPA solutions
We are committed to ensuring equal employment opportunities for job applicants and employees. Our recruitment processes use balanced selection criteria and avoid unlawful discrimination against applicants on the basis of their age, colour, disability, marital status, national origin, gender, gender identity, genetic information, race or racial origin, religion, sexual orientation or any other status protected or required by law.