Case Study 1 Cyber Security

Cyber Security:


Identify & Privilege Access Management

Client: Payments Provider


Client Challenge:


We were asked by the Client to deliver identity access management and professional services consulting to address IAM, PAM, and PEM needs in multiple enterprise networks. The team of Architects designed and oversaw the architecture for Centrify Identity and Access Management Project as well.


What We Did:


Responsible for the design of Centrify architecture to address customers IAM, PAM, and PEM needs.

Provide support designing, installing, implementing, and configuring all aspects of Centrify products including Infrastructure Services, Privilege Access Service, and Direct Audit

Wrote custom scripts for Centrify tasks including API calls.

Responsible for maintaining all paperwork detailing all work activities, timesheets, and expense reports and submitting them on time.

This includes working with stakeholders across Information, Audit, Risk and Compliance teams to identify, catalog, and document all related policy controls, access, and audit procedures.

Develop risk mitigation strategies based on MITRE Attack Framework and SANS as part of working with SOC for Incident Response

Outcome & Results:


Provide ongoing support designing, installing, implementing, and configuring all aspects of Centrify products including Infrastructure Services, Privilege Access Service, and Direct Audit

Responsible for maintaining all paperwork detailing all work activities, timesheets, and expense reports and submitting them on time.

Operate and manage the deployment of the Privileged Access Management ecosystem across AWS and on prem environments.

Deployment of IAM controls in the 25000+ server environment