companyCyberArk logo

Security Services Architect - Mumbai, India

CyberArkMumbai
On-site Full-time

Clicking Apply Now takes you to AutoApply where you can tailor your resume and apply.


Unlock Your Potential

Generate Job-Optimized Resume

One Click And Our AI Optimizes Your Resume to Match The Job Description.

Is Your Resume Optimized For This Role?

Find Out If You're Highlighting The Right Skills And Fix What's Missing

Experience Level

Mid to Senior

Qualifications

At least 12 years of comprehensive experience in cybersecurity, emphasizing enterprise solution architecture and risk management, with 5-7 years specifically in Identity Credential and Access Management (ICAM), and a minimum of 3 years working with CyberArk PAM Self-Hosted (on-prem) architecture and implementation. Deep expertise in identity security, privileged access management, and large-scale IT environments. Hands-on experience in designing and implementing CyberArk On-Prem PAM in both on-premises and cloud environments, especially versions post v11.x. Experience with CyberArk PAM-SaaS or other CyberArk SaaS solutions (SCA, SWS, Identity, EPM) is a plus. Extensive practical experience in at least two cloud technologies: AWS, Azure, or GCP. Proficiency in technologies such as Active Directory, LDAP, SAML, OAuth, Python, and PowerShell, with substantial hands-on experience in at least two of these technologies. Relevant certifications in cybersecurity or related fields are highly desirable.

About the job

We are seeking a highly skilled Security Services Architect to join our team in Mumbai, India. In this key role, you will be instrumental in the design, planning, and execution of CyberArk solutions tailored to our diverse clientele. By establishing best practices and innovative strategies, you will navigate the continuously evolving security landscape. Close collaboration with implementation services, sales, and product management is essential to ensure that the solutions you design meet customer expectations and are executed flawlessly. You will lead significant security initiatives, guaranteeing that our products and systems remain resilient against emerging threats.

  • Design & Architecture: Craft and document secure solution architectures customized to client requirements.
  • Solution Delivery: Oversee the complex deployment of CyberArk solutions through their entire lifecycle.
  • Advisory & Expertise: Offer strategic insights on industry trends and best practices in identity security and privileged access management.
  • Business Alignment: Evaluate client priorities and recommend solutions that effectively balance security with business impact and operational efficiency.
  • Security Standards: Develop and promote standard practices for deploying CyberArk solutions and securing identities.
  • Technical Leadership: Serve as a trusted expert for both clients and internal teams, providing mentorship and knowledge transfer.
  • Stakeholder Engagement: Foster strong relationships with clients, acting as the primary liaison between them and CyberArk’s internal teams.
  • Governance & Assurance: Participate in design reviews, risk assessments, and incident responses to ensure compliance with security standards.
  • Enablement & Training: Conduct training sessions, create secure deployment guidelines, and enhance internal/external security awareness.
  • Continuous Innovation: Remain informed of emerging threats, technologies, and industry trends; contribute to CyberArk’s thought leadership in security.
  • Technical Account Manager: Function as the technical account manager for specific clients, coordinating deployment activities and providing necessary consulting support.

About CyberArk

About CyberArk:CyberArk, a subsidiary of Palo Alto Networks, stands as the global frontrunner in identity security, relied upon by organizations worldwide to protect human and machine identities within modern enterprises. Our AI-powered Identity Security Platform implements intelligent privilege controls for every identity, facilitating continuous threat prevention, detection, and response throughout the identity lifecycle. By promoting a zero-trust and least-privilege model, we empower users and identities—ranging from workforce to IT, developers, and machines—to securely access resources from any location. Discover more about us at CyberArk.com.

Similar jobs

Tailoring 0 resumes

We'll move completed jobs to Ready to Apply automatically.