Job Description:
About us:
DXC Technology
DXC Technology (NYSE: DXC) is the world’s leading independent, end-to-end IT services company, helping clients harness the power of innovation to thrive on change.
Created by the merger of CSC and the Enterprise Services business of Hewlett Packard Enterprise, DXC Technology serves nearly 6,000 private and public sector clients across 70 countries. The company’s technology independence, global talent and extensive partner alliance combine to deliver powerful next-generation IT services and solutions. DXC Technology is recognized among the best corporate citizens globally. For more information, visit www.dxc.technology
Key Responsibilities
- Own the end-to-end architecture and high-level design for CyberArk PAM Self-Hosted and CyberArk Conjur as strategic platforms for Privileged Access Management and secrets management.
- Define and maintain reference architectures, patterns and standards for onboarding infrastructure, applications, DevOps platforms and third parties into CyberArk.
- Design CyberArk PAM Self-Hosted components (Vault, PVWA, PSM, CPM, PSMP, PTA, DR) for resilience, scalability, segregation of duties and regulatory compliance.
- Architect CyberArk Conjur to securely manage application, machine and DevOps secrets, including integration with CI/CD pipelines, containers, Kubernetes/OpenShift and cloud platforms.
- Work closely with security, DevOps and infrastructure teams to design integrations with AD/LDAP, identity providers (SAML/OIDC), SIEM (Splunk), ITSM and ticketing tools.
- Provide architectural leadership on privileged access risk reduction, including threat modelling, control selection and alignment with security policies and standards.
- Act as a trusted advisor to senior stakeholders (CISO, security architecture, platform owners, programme management), explaining PAM and secrets architectures in clear business terms.
- Govern and review detailed designs and implementation by SMEs and delivery partners to ensure conformance with architecture and security requirements.
- Contribute to roadmaps, business cases and investment planning for PAM and secrets management capabilities.
- Provide technical oversight and mentorship to PAM and DevOps teams, promoting best practice and knowledge sharing.
Required Skills and Experience
- Significant experience (typically 7+ years) in cybersecurity architecture, including a deep understanding of Privileged Access Management in complex, regulated environments.
- Proven, hands-on architectural experience with CyberArk PAM Self-Hosted, including most of: Vault, PVWA, PSM, CPM, PSMP, PTA, DR and associated components.
- Strong experience designing and integrating CyberArk Conjur (or CyberArk Secrets Manager) for application and DevOps secrets management.
- Demonstrable experience designing CyberArk integrations with Microsoft Active Directory/LDAP, identity providers (SAML/OIDC), SIEM, ITSM and ticketing tools and one MFA tool
- Understanding of DevOps and cloud-native ecosystems (e.g. Kubernetes, OpenShift, CI/CD pipelines, infrastructure-as-code) and how to embed CyberArk Conjur in these.
- Solid awareness of security and audit expectations (e.g. NCSC guidance, ISO 27001, NIST, FCA/financial or government standards).
- Strong stakeholder management skills, with the ability to communicate complex PAM and secrets topics to technical and non-technical stakeholders, up to senior management.
- Experience working in or with secure, classified or national security-related environments.
- Excellent documentation skills (HLD/LLD, patterns, design decisions) and ability to provide clear architectural direction.
Desirable Qualifications/Certifications
- CyberArk Certifications Sentry or Guardian focusing on PAM Self-Hosted
- Fluent Dutch language is a strong plus
What we offer you:
An attractive salary package.
Comprehensive social benefits.
Flexible working hours in a hybrid work environment
Facilitating workplace at home.
Training and mentoring to support the implementation projects.
Lived values that make us one of the most attractive employers worldwide.
In addition, DXC Technology stands for equal opportunities and offers employees the compatibility of family and work as well as continuous development opportunities.
DXC Technology stands for equal opportunities, namely we do not discriminate on the basis of race, religion, colour, sex, age, disability or sexual orientation. All recruitment decisions are based solely on qualifications, skills, knowledge and experience and relevant business requirements
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.