Description
Security PAM - PKI
The key is large enterprise environment
Pki infrastructure, Microsoft certificate authority
HSM
CyberArk and Hashicorp is a plus
SALARY: Open
LOCATION: Remote if in: IL, TX, FL, GA, MA, MD, MN, NC, NJ, NY, DC, WI or in office Chicago, IL/Dallas, TX
Looking for a PAM - PKI expert to support the privileged access management (PAM) team for PKI Implementations across the enterprise. You will automate ADCS (Active Directory Certificate Services) and HSM Hardware security modules Microsoft certificate authority cryptographic operations PAM Windows services multiple data center private cloud any CyberArk hashicorp vault for PAM a plus, manage certificate templates AWS
You will work with the PAM team to design, implement, and automate new ADCS and HSM environments into the PKI framework. The position will include heavy interaction with Architecture, PAM, Windows services, and end-users for the duration of the PKI project.
Key Responsibilities:
- Support the installation and configuration of PKI Solution (eg, ADCS, HSM)
- Implement and manage certificate templates and revocation configurations.
- Participate in all design sessions for PKI in multiple datacenters and private cloud and provide knowledge of PKI architecture and configurations.
- Help build PKI management capabilities using ADCS and on prem HSM's.
- Support ability to maintain development, pre-production, and production PKI environments.
- Assist in building and maintaining secure integrations with ADCS and HSM's.
- Participate in the creation of a strategy and solutions design for presentation to Enterprise Architecture Working Groups. Design should include (but not limited to)
EXPERIENCE REQUIRED:
- Experience with Microsoft certificate authority PKI infrastructure.
- Experience with hardware security modules (HSMs).
- Requires in-depth knowledge of encryption algorithms, protocols, and best practices.
- 5+ years of experience in PKI infrastructure including Microsoft Certificate Authority and HSM's.
- Knowledge of cryptographic operations, secure key storage, and key lifecycle management with HSM and encryption tools.
- Knowledge of end-to-end encryption, data at rest, and data in transit protection methodologies.
- Ability to interpret logs and events related to PKI, HSMs, encryption, and PAM activities.