Latest Jobs
Learning Support Assistant
Romford, Essex
Account Manager
Stoke-on-trent, Staffordshire
PA to the Headmistress
Not Specified, London
Positive Behaviour Support Workers (Ref: PBSW-1117)
Not Specified, London
Trainee Driving Instructor
Not Specified, Scottish Borders
Trainee Driving Instructor
Horsham, Sussex
Trainee Driving Instructor
Gateshead, Tyne And Wear
Trainee Driving Instructor
Eastleigh, Hampshire
Software Support Technician
Windsor, Berkshire
Trainee Driving Instructor
Stevenage, Hertfordshire
Company Info
CACI Network Services

Company Profile

Security Consultant (CyberArk)

Posted by CACI Network Services on 11.17.2017
Job ID: 1161387
Location: Hatfield, Hertfordshire, United Kingdom
Job Category: Information Technology, Telecommunications
Salary: £450.00 per day
Job Views: 479
Post Code:
Employment Type: Contractor
Posted: 11.17.2017

Job Description

CACI Network Services is a rapidly expanding specialist IT and Networks consultancy offering a wide variety of opportunities to work within challenging and exciting environments with our major clients in Global Media, Banking, Government, Telecoms & Utilities.

CACI are seeking an experienced and highly motivated Security Consultant to work on a number of security projects in Hatfield. The Security Consultant will be a key player in helping the customer employ best practice in deploying access control solutions.


Our client is looking for someone who can help their team employ best practice in deploying access control solutions.

The individual needs to be an expert in:

  • Manage User Identity (MUI)
  • Siteminder
  • Integration with Active Directory
  • Manage Privileged Access (MPA)
  • CyberArk DNA tool

The Security Consultant will also need to be able to define tactical options for Legacy estate for privileged users, running a light audit and making recommendations for existing support vendors to follow.

The Security Consultant needs to be able to act as an SME to the client designers, architects and in-house security team to define best practice around access control.

  • Previous Next