What are the responsibilities and job description for the Cyber Security Specialist position at Match Point?
Job Title : Expert Privileged Access Management Product Specialist
Location : Oakland, CA
Work Type : Hybrid 3 days onsite
Department Overview
The Cybersecurity Services department serves as the centralized cybersecurity technology infrastructure operating arm of Cybersecurity and undertakes a broad range of activities focused on securing PG&Es network, systems, and data. The Cybersecurity Services is primarily tasked with operating and maintaining PG&Es privileged access and security technology infrastructure to ensure the safe and reliable operation of PG&Es cyber security tools and systems within an enterprise-wide setting while ensuring that the deployment of tools as well as their scope is appropriately managed. The Cybersecurity Services department supports projects during the project / software life cycle for PG&Es standard security solutions to ensure that operation requirements are met. PG&E's Cybersecurity Services, Identity and Access Management Team supports technologies that provide identity life cycle, authentication, and role-based access to our systems.
Position Summary :
We are seeking an Expert IT Security Product Specialist in PG&Es Identity and Access Management team. The role of this position is to provide support for our privileged access and password management tool, and related privileged access management technologies. The successful candidate will provide project consultation, solution deliverables, product documentation, and support on technology product lines, and / or technology service offerings managed by Cybersecurity. The successful candidate will maintain vendor relationships to ensure technical performance requirements, for both new and legacy systems, are met and will be responsible for the products existing maintenance contracts and / or license compliance, partnering with projects on requests for new product contracts and licenses.
This position is hybrid, working PG&E office. The assigned work location will be within the PG&E Service Territory.
Job Responsibilities
Product Management & Operations : Administration and support of Beyond Trust Password Safe in either a primary or secondary capacity depending on the product and the experience level of the successful candidate.
IT Product Analysis : Collaborate and confer with the accountable planning organization to develop the technical and business strategic vision and how it applies to the targeted products or services. Understand the product positioning, key benefits, and target users. Gather and analyze changing business and user requirements. In partnership with the planning organization, research new market technologies and make recommendations based on the Companys future business needs and processes.
Product Lifecycle : Manage the continuous product lifecycle from research, planning and implementation to retirement, including cost management. Introduce new innovative solutions, create support structure, and integrate product with company standards. Involved in the implementation, including installation, testing, communicating, and documenting of the product. Advocates and communicates key messages and strategies, promotes the product, educates, and trains support staff.
Solution Design : Interface with internal IT stakeholders to understand and analyze a projects business and technical requirements. Can translate requirements into a detailed solution design leveraging the targeted IT products or services for teams to be able to properly deploy and implement. Be familiar with IT planning methodologies. Be able to provide accurate project timelines, labor cost estimates and equipment cost estimates to the project. Can manage multiple assigned projects.
Capacity Planning : Manage the enterprise-wide technical capacity for the targeted IT products or services. Work with projects to determine the best use of existing capacity for resource allocation. Partner with key stakeholders to determine and understand future capacity requirements. Analyze areas of opportunities to optimize costs of IT products or services. Engage with the products vendor to manage the process to request additional units including working with projects needing new product contracts and licenses. Perform contract management and be responsible for understanding and complying with the products existing maintenance contracts and / or licenses.
Provide operational support and work Incidents, Work Orders and Change Control (BMC Remedy)
Participate in an On-Call rotation (24x7)
Support : Work closely with IT professionals to troubleshoot and resolve issues. Drive conventions and standards (such as usage or configuration) across products to maximize user experience. In the absence of a third-tier support specialist, perform the role of third-tier support to other IT professionals.
Vendor Technical Liaison : Participate in business, technical, and contract negotiations with vendors. Act as a conduit for vendor relationship, licensing, and incident management. Be an advocate for business unit and IT operational clients to ensure business requirements are cost effective and needs are met. Provide budget support to IT professionals and stakeholders.
Documentation : Develops a variety of documentation such as strategies, plans, designs, usage or configuration standards, policies, guidelines, user requirements, roadmaps, reports, metrics, process manuals, configuration manuals, and other documentation specific and necessary for the targeted product or service.
Minimum Qualifications :
Bachelors degree in computer science, Engineering, or equivalent work experience.
8 Years experience in Cyber Security or Information Technology with a minimum of 3 years focus on Privileged Access Management.
Demonstrated experience with Identity and Access Management technologies.
Demonstrated experience with managing, maintaining, and supporting a Privileged Access Management tool at an enterprise level.
Desired :
Masters degree in computer science, or Information Security or similar field; or equivalent experience
Experience with provisioning and password safe tools such as Beyond Trust Password safe, Powerbroker for Windows.
Experience with Privileged Access Management Processes including on-boarding, account management, password rotation, password safe policies, and account brokering for Windows policies.
Strong knowledge of Windows servers and workstations
Familiarity with SSH key management
Strong knowledge of Active Directory and other LDAP directories
Experience with multi-factor authentication such as RSA SecurID
Understanding of Public Key Infrastructure (PKI)
Understanding of role-based access controls (RBAC)
Ability to reverse engineer technology & configuration for troubleshooting.
Knowledge, Skills, and Abilities :
Strong written and good oral communication, ability to document diagrams and business cases, and collaboration skills.
Demonstrated ability to work both as an individual contributor and in a team environment
Proven customer facing skills and the ability to effectively communicate at both a high-level and a technical level
Security minded and ability to handle evidence containing sensitive information
Strong understanding of information security fundamentals, concepts, and strategy
Understanding of modern role-based access and delegation security models
Understanding of risk assessment and analysis
Understanding of SOX and / or other compliance framework requirements and evidence gathering
Excellent written and verbal communications skills
Demonstrated technical knowledge of and direct experience working with the following technologies :
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Cyber Security Specialist?
Sign up to receive alerts about other jobs on the Cyber Security Specialist career path by checking the boxes next to the positions that interest you.