Job Board
LogoLogo

Get Jobs Tailored to Your Resume

Filtr uses AI to scan 1000+ jobs and finds postings that perfectly matches your resume

Cadence Design Systems Logo

Enterprise Security Developer (CyberArk)

Cadence Design Systems

Salary not specified
Dec 1, 2025
San Jose, CA, US
Apply Now

Cadence is looking for a CyberArk Engineer to enhance their security posture by integrating enterprise applications with CyberArk, managing privileged accounts, and implementing endpoint privilege policies.

Requirements

  • Strong coding experience in Python/Java and scripting (REST APIs, PowerShell).
  • Hands-on experience with CyberArk PAM suite (PAS, CCP, CPM, PVWA, WPM, EPM).
  • Solid knowledge of account onboarding, endpoint privilege management, and automation.
  • Understanding of OS-level privilege management (Windows UAC, macOS security frameworks, Linux sudo policies).
  • CyberArk Certifications (Defender, Sentry, EPM, WPM).
  • Cloud (AWS/Azure) and DevOps pipeline exposure.
  • Experience with endpoint hardening, malware defense, and integration with EDR solutions.

Responsibilities

  • Develop and maintain Python/Java scripts for integrating enterprise applications with CyberArk.
  • Implement and support CyberArk components (Core PAS, CPM, PVWA, CCP, WPM, EPM).
  • Onboard privileged accounts, manage password rotations, and enforce endpoint privilege policies.
  • Troubleshoot CyberArk integrations, automation, and platform onboarding issues.
  • Perform upgrades, patching, and contribute to design/configuration documentation.
  • Apply secure coding and DevSecOps practices; provide UAT and production rollout support.
  • Configure and manage EPM policies across multiple OS environments (Windows, macOS, Linux).

Other

  • 5+ years IT experience, including 2–3 years in CyberArk implementation/support.
  • Strong analytical skills to perform root cause analysis, optimize automation, and identify trends.
  • Agile/Scrum experience.
  • Bachelor’s in Computer Science, IT, or related field.
  • Knowledge of IAM principles and risk/usage analytics.