Profileimage by Sumit Kumar CyberArk Implementation Engineer and consultant from Noida

Sumit Kumar

available

Last update: 21.05.2016

CyberArk Implementation Engineer and consultant

Graduation: not provided
Hourly-/Daily rates: show
Languages: English (Native or Bilingual)

Attachments

sumit-kumar_cv.docx

Skills

Org/Role:
Leading Digital Software Company (U.S.)
Technical SME , Cyber Security

Brief
Description:

 
Client is leading digital software company to provide industrial software solutions powered by industrial internet. This project is part of their Cyber Security program.
 
  • Part of the company’s Cyber Security program for providing object identity management solutions.
  • Develop, manage, and execute project plans and timelines for key deliverables of enterprise PAS/SIM implementations
  •  Assist with on-site implementations and customer communications
  •  Collaborate in the ongoing development of training materials and curricular
  •  Consult with enterprise level customers about network security and privileged account security
  • Installation & Implementation of CyberArk 9.5 on cloud as platform as a service
  • Integration of CyberArk with Cloud technologies
  • Integration of CyberArk with DUO two factor authentication
  • Wide implementation of  application and identity management (AIM) module to protect hardcoded and embedded application passwords


 
Org/Role:
Tata Consultancy Services
Technology Owner

Brief
Description:

 
Part of TCS internal program to develop lab on AWS to showcase capability of the product and provide training to new associates
  • Part of Enterprise Security & Risk Management COE practice
  • Involved in Security architecture design for newly deployed application in IT infrastructure
  • Responding to RFP for PAM solutions
  • Setting up CyberArk 9.3 PASS environment on Amazon Cloud
  • Implementation of CyberArk related use cases


 
 
 
 
Org/Role:
Leading Electronic Testing Company (U.S)
                                                      SME , Privilege Identity Management (PIM)

Brief
Description:

Client provide industrial automation products include collaborative robots used by global manufacturing and light industrial customers to improve quality and increase manufacturing efficiency. This project was part of their Cyber Security program to protect privilege identity across the IT estate.
 
  • Architectural designing of Cyberark 8.2 solution to cover almost all privileged accounts.
  • Involved in information gathering and understanding existing system of the organization and creating solution blueprint for solution and creating approach to onboard privileged entities.
  • Integration with SIEM tools for security on monitoring e.gNimSoftand Qualys guard.
  • Heavily involved in creating all the process and transitioning documents..
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM), PSMP for UNIX servers and AIM for database servers.
  • Creating BYOC to support existing IT framework with help of AutoIT and PSM connector
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.
  • Customizations of Cyber-Ark for to enable password management and session management for  application e.g. HP ILO , DRAC , Private Ark client, PVWA web interface for Cyberark admin.
 

 
 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                  Security Analyst , PIM

Brief
Description:

client is global, innovation-driven biopharmaceutical company . This project was part of their Cyber Security program to protect privilege identities across the IT estate
 
  • Installation, Integration and configuration of Cyber-Ark PIM tool 7.1 and 8.1 with Windows and Unix servers.
  • Involved in information gathering and understanding existing system of the organization.
  • Integration with SIEM tools for security on monitoring e.g Arc Sight and Qualys guard.
  • Involved in planning and defining design approach for safes and policies.
  • Worked extensively in implementation of Privileged Identity Management suite for Windows,UNIX and Database servers.
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM) for UNIX servers and AIM for database servers.
  • Involved in documentation for the project.
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.


 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                         System Administrator  

Brief
Description:
  • Analyze and resolve OS and access problems on Sun, HP-UX,Linux and AIX systems on day-to-day activity.
  • Setting up and configured RHEL and Centos and UbantuServers.
  • Managing user and groups on NIS+, LDAP and Unix servers..
  • Backup & Restoration by using tar, cpio.
  • Implementing firewall policy using Iptables, net filters, Natting& IP masquerading.
  • TCP Wrappers and PAM (Pluggable Authentication Module).
  • NFS configuration & administration
  • Configuring SAMBA (SMB), NFS, DHCP, NIS, LDAP, Sendmail, Postfix.
  • Web servers (Apache), Virtual hosting and User Authentication. Use of HTTPS to make secure transaction.
  • Worked with Server performance Monitoring.
  • Configurationof Yum Servers,manageingfilesytem with Logical Volume Management (LV , VG , PV)
  • SSH key management on UNIX servers and securing keys.
  • Wrote scripts for automating user, group management  and information gathering using Shell script and Perl.
  • Created SOX reporting tool for auditing and compliance.
  • Automating and Scheduling Jobs through Cron.
  • Participated in on-call rotation to provide 24x7 technical support.
  • Participate in root-cause analysis of recurring issues, system backup, and security setup.
  • Configuration and maintenance of Sudoers file.
  •  Modification Ownership and permission for file and directory.
  • understanding of VERITAS Storage & VERITAS Clustering
  • Debugging Java code , Module Integration, Web Interface designing with servlet and JSP, SQL
 
Org/Role:
Leading Digital Software Company (U.S.)
Technical SME , Cyber Security

Brief
Description:

 
Client is leading digital software company to provide industrial software solutions powered by industrial internet. This project is part of their Cyber Security program.
 
  • Part of the company’s Cyber Security program for providing object identity management solutions.
  • Develop, manage, and execute project plans and timelines for key deliverables of enterprise PAS/SIM implementations
  •  Assist with on-site implementations and customer communications
  •  Collaborate in the ongoing development of training materials and curricular
  •  Consult with enterprise level customers about network security and privileged account security
  • Installation & Implementation of CyberArk 9.5 on cloud as platform as a service
  • Integration of CyberArk with Cloud technologies
  • Integration of CyberArk with DUO two factor authentication
  • Wide implementation of  application and identity management (AIM) module to protect hardcoded and embedded application passwords


 
Org/Role:
Tata Consultancy Services
Technology Owner

Brief
Description:

 
Part of TCS internal program to develop lab on AWS to showcase capability of the product and provide training to new associates
  • Part of Enterprise Security & Risk Management COE practice
  • Involved in Security architecture design for newly deployed application in IT infrastructure
  • Responding to RFP for PAM solutions
  • Setting up CyberArk 9.3 PASS environment on Amazon Cloud
  • Implementation of CyberArk related use cases


 
 
 
 
Org/Role:
Leading Electronic Testing Company (U.S)
                                                      SME , Privilege Identity Management (PIM)

Brief
Description:

Client provide industrial automation products include collaborative robots used by global manufacturing and light industrial customers to improve quality and increase manufacturing efficiency. This project was part of their Cyber Security program to protect privilege identity across the IT estate.
 
  • Architectural designing of Cyberark 8.2 solution to cover almost all privileged accounts.
  • Involved in information gathering and understanding existing system of the organization and creating solution blueprint for solution and creating approach to onboard privileged entities.
  • Integration with SIEM tools for security on monitoring e.gNimSoftand Qualys guard.
  • Heavily involved in creating all the process and transitioning documents..
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM), PSMP for UNIX servers and AIM for database servers.
  • Creating BYOC to support existing IT framework with help of AutoIT and PSM connector
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.
  • Customizations of Cyber-Ark for to enable password management and session management for  application e.g. HP ILO , DRAC , Private Ark client, PVWA web interface for Cyberark admin.
 

 
 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                  Security Analyst , PIM

Brief
Description:

client is global, innovation-driven biopharmaceutical company . This project was part of their Cyber Security program to protect privilege identities across the IT estate
 
  • Installation, Integration and configuration of Cyber-Ark PIM tool 7.1 and 8.1 with Windows and Unix servers.
  • Involved in information gathering and understanding existing system of the organization.
  • Integration with SIEM tools for security on monitoring e.g Arc Sight and Qualys guard.
  • Involved in planning and defining design approach for safes and policies.
  • Worked extensively in implementation of Privileged Identity Management suite for Windows,UNIX and Database servers.
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM) for UNIX servers and AIM for database servers.
  • Involved in documentation for the project.
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.


 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                         System Administrator  

Brief
Description:
  • Analyze and resolve OS and access problems on Sun, HP-UX,Linux and AIX systems on day-to-day activity.
  • Setting up and configured RHEL and Centos and UbantuServers.
  • Managing user and groups on NIS+, LDAP and Unix servers..
  • Backup & Restoration by using tar, cpio.
  • Implementing firewall policy using Iptables, net filters, Natting& IP masquerading.
  • TCP Wrappers and PAM (Pluggable Authentication Module).
  • NFS configuration & administration
  • Configuring SAMBA (SMB), NFS, DHCP, NIS, LDAP, Sendmail, Postfix.
  • Web servers (Apache), Virtual hosting and User Authentication. Use of HTTPS to make secure transaction.
  • Worked with Server performance Monitoring.
  • Configurationof Yum Servers,manageingfilesytem with Logical Volume Management (LV , VG , PV)
  • SSH key management on UNIX servers and securing keys.
  • Wrote scripts for automating user, group management  and information gathering using Shell script and Perl.
  • Created SOX reporting tool for auditing and compliance.
  • Automating and Scheduling Jobs through Cron.
  • Participated in on-call rotation to provide 24x7 technical support.
  • Participate in root-cause analysis of recurring issues, system backup, and security setup.
  • Configuration and maintenance of Sudoers file.
  •  Modification Ownership and permission for file and directory.
  • understanding of VERITAS Storage & VERITAS Clustering
  • Debugging Java code , Module Integration, Web Interface designing with servlet and JSP, SQL
 
Org/Role:
Leading Digital Software Company (U.S.)
Technical SME , Cyber Security

Brief
Description:

 
Client is leading digital software company to provide industrial software solutions powered by industrial internet. This project is part of their Cyber Security program.
 
  • Part of the company’s Cyber Security program for providing object identity management solutions.
  • Develop, manage, and execute project plans and timelines for key deliverables of enterprise PAS/SIM implementations
  •  Assist with on-site implementations and customer communications
  •  Collaborate in the ongoing development of training materials and curricular
  •  Consult with enterprise level customers about network security and privileged account security
  • Installation & Implementation of CyberArk 9.5 on cloud as platform as a service
  • Integration of CyberArk with Cloud technologies
  • Integration of CyberArk with DUO two factor authentication
  • Wide implementation of  application and identity management (AIM) module to protect hardcoded and embedded application passwords


 
Org/Role:
Tata Consultancy Services
Technology Owner

Brief
Description:

 
Part of TCS internal program to develop lab on AWS to showcase capability of the product and provide training to new associates
  • Part of Enterprise Security & Risk Management COE practice
  • Involved in Security architecture design for newly deployed application in IT infrastructure
  • Responding to RFP for PAM solutions
  • Setting up CyberArk 9.3 PASS environment on Amazon Cloud
  • Implementation of CyberArk related use cases


 
 
 
 
Org/Role:
Leading Electronic Testing Company (U.S)
                                                      SME , Privilege Identity Management (PIM)

Brief
Description:

Client provide industrial automation products include collaborative robots used by global manufacturing and light industrial customers to improve quality and increase manufacturing efficiency. This project was part of their Cyber Security program to protect privilege identity across the IT estate.
 
  • Architectural designing of Cyberark 8.2 solution to cover almost all privileged accounts.
  • Involved in information gathering and understanding existing system of the organization and creating solution blueprint for solution and creating approach to onboard privileged entities.
  • Integration with SIEM tools for security on monitoring e.gNimSoftand Qualys guard.
  • Heavily involved in creating all the process and transitioning documents..
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM), PSMP for UNIX servers and AIM for database servers.
  • Creating BYOC to support existing IT framework with help of AutoIT and PSM connector
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.
  • Customizations of Cyber-Ark for to enable password management and session management for  application e.g. HP ILO , DRAC , Private Ark client, PVWA web interface for Cyberark admin.
 

 
 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                  Security Analyst , PIM

Brief
Description:

client is global, innovation-driven biopharmaceutical company . This project was part of their Cyber Security program to protect privilege identities across the IT estate
 
  • Installation, Integration and configuration of Cyber-Ark PIM tool 7.1 and 8.1 with Windows and Unix servers.
  • Involved in information gathering and understanding existing system of the organization.
  • Integration with SIEM tools for security on monitoring e.g Arc Sight and Qualys guard.
  • Involved in planning and defining design approach for safes and policies.
  • Worked extensively in implementation of Privileged Identity Management suite for Windows,UNIX and Database servers.
  • Worked extensively in implementation and deployment of On demand privilege manager(OPM) for UNIX servers and AIM for database servers.
  • Involved in documentation for the project.
  • Involved in writing test cases and conditions.
  • Troubleshooting the technical issues in the project during implementation.


 
 
Org/Role:
Multinational pharmaceutical and biologics company (U.K)
                                         System Administrator  

Brief
Description:
  • Analyze and resolve OS and access problems on Sun, HP-UX,Linux and AIX systems on day-to-day activity.
  • Setting up and configured RHEL and Centos and UbantuServers.
  • Managing user and groups on NIS+, LDAP and Unix servers..
  • Backup & Restoration by using tar, cpio.
  • Implementing firewall policy using Iptables, net filters, Natting& IP masquerading.
  • TCP Wrappers and PAM (Pluggable Authentication Module).
  • NFS configuration & administration
  • Configuring SAMBA (SMB), NFS, DHCP, NIS, LDAP, Sendmail, Postfix.
  • Web servers (Apache), Virtual hosting and User Authentication. Use of HTTPS to make secure transaction.
  • Worked with Server performance Monitoring.
  • Configurationof Yum Servers,manageingfilesytem with Logical Volume Management (LV , VG , PV)
  • SSH key management on UNIX servers and securing keys.
  • Wrote scripts for automating user, group management  and information gathering using Shell script and Perl.
  • Created SOX reporting tool for auditing and compliance.
  • Automating and Scheduling Jobs through Cron.
  • Participated in on-call rotation to provide 24x7 technical support.
  • Participate in root-cause analysis of recurring issues, system backup, and security setup.
  • Configuration and maintenance of Sudoers file.
  •  Modification Ownership and permission for file and directory.
  • understanding of VERITAS Storage & VERITAS Clustering
  • Debugging Java code , Module Integration, Web Interface designing with servlet and JSP, SQL

Project history

Leading Digital Software Company (U.S.)
Technical SME , Cyber Security

Time and spatial flexibility

I am located in India and can support the project remotely.

Contact form

Contact details

Profileimage by Sumit Kumar CyberArk Implementation Engineer and consultant from Noida CyberArk Implementation Engineer and consultant
Register