Role : IT cyber-security / IT Project Manager
Location : City of Las Vegas, NV .
Duration : 3-5 Month.
We are looking at an approximate 3-5 month duration for the PM. We would like them to handle ALL aspects of the project schedule, even though there will be quite a bit of professional services provided by the vendor, including project management assistance. We definitely need someone who will manage the resources on the City of Las Vegas side of the contract to ensure we get this project in quickly, efficiently and correctly. We need someone who can be a VERY FIRM but professional and polite in ensuring tasks are completed on time and we hit our aggressive deadlines. They cannot be shy about pushing for results. This will be a FAST MOVING project so we need someone who is quick and can keep up with that type of pace, yet do so accurately and with minimal guidance.
The implementation will include the following 3 Cyber Ark modules:
· Privileged Access Manager - Protects accounts and credentials that have elevated access to our resources. Examples include network administrators, systems administrators, and database administrators. These accounts and credentials are a primary target of threat actors. With PAM, passwords are known only to the PAM tool and therefore cannot be inadvertently (or purposely) shared. Even if a criminal were to gain access into our network, they would not be able to steal or use credentials for privileged accounts.
· Endpoint Privilege Manager (EPM) - Controls "local administrator' access on desktops and laptops. Ideally, local administrator access to our desktops and laptops would be limited to IT staff only. However, the reality is that there are legitimate circumstances that require end users to have this type of elevated access to certain machines. This tool allows us to provide very specific and targeted elevated access for end users to a machine or group of machines. In addition, this tool provides us with another layer of protection from ransomware. It also provides an audit trail of changes and other activity on our endpoints. Implementation of this tool should also cut down on requests to the Desktop Support team regarding this type of access..
- provided by Dice