1. Who is Marnik?

Meet Marnik, a cyber security consultant who has recently returned to his roots in the field after a successful career as a professional racing driver and coach. 

Marnik’s early career in cyber security was marked by his skills and knowledge of Vulnerability management. However, after a year in the industry, he decided to take a break and pursue his lifelong passion for racing. With hard work, dedication, and natural talent, Marnik quickly rose through the ranks to become a respected racing coach and driver.

But despite his success on the track, Marnik never lost his passion for cyber security. And so, after taking the time to build a solid foundation for his racing business, he returned to the industry as an IAM consultant at Actwise. Drawing on his experience as a driver and coach, Marnik brings a unique perspective to his consulting work, emphasizing the importance of teamwork, communication, and a clear strategy in addressing complex cyber security challenges. Thanks to his knowledge of IAM systems and his ability to think creatively and strategically, Marnik is a valuable asset to Actwise and a trusted partner to his clients.

2. What was your first impression of the company and the team?

When Jelle arrived to greet me and took me on a tour of the office. I was struck by how welcoming and helpful they are, answering all my questions and introducing me to some of my new colleagues. Everyone I met is friendly and they all seem passionate about their work.

Overall, my first impressions of the company and team are overwhelmingly positive. I feel excited about the opportunities ahead and confident that I have made the right decision to join the company.

3. What are some of the things that you learned during your first week?

–  Understanding CyberArk’s role in Privileged Access Management (PAM): CyberArk is a leading PAM solution provider, and as an IAM security consultant, it’s essential to understand the importance of PAM in securing the organization’s critical assets.

–  Familiarization with CyberArk’s platform and modules: CyberArk’s platform consists of various modules that perform different functions, such as password management, session isolation, and application identity management. Familiarizing yourself with these modules will help you understand how the platform works.

–  How the Cronos Group operates: through a decentralized model, with each subsidiary or partner company having its own area of specialization. This allows the company to offer a diverse range of IT services, from software development to cloud computing to cybersecurity.

4. What are you looking forward to in the coming months?

–  Finishing my CyberArk courses succesfully and achieve my first Certificate from CyberArk. Working for my first client as I will work with a wide range of clients across different industries, each with their unique set of security challenges. 

–  Making a difference in cybersecurity as an IAM security consultant, I will play a crucial role in helping organizations safeguard their sensitive data and assets from cyber attacks. My work will have a direct impact on the security of the organization I work for and the broader cybersecurity landscape. 

–  Collaborating with other security professionals as IAM security is often a collaborative effort, and as a consultant, I will work closely with other security professionals to design and implement secure IAM solutions.

Ready to join our team?

MORE INTERESTING RESOURCES

Protect your organization’s secrets

Securing privileged accounts and credentials is common sense these days, but are your application and machine accounts equally protected? Did you know there are often up to 45 times more machine identities than human identities and the vast majority of them has privileged entitlements? For this reason, these accounts existing in both static and dynamic environments often serve as an easy gateway for severe breaches as they are not sufficiently secured. With ActWise we implement CyberArk’s Secrets Management solutions to ensure both your applications and DevOps infrastructure and pipelines have their passwords rotated and secured. Moreover, these solutions contribute to the NIS2 compliance for your organization. Watch this video and discover how ActWise is the ideal partner to protect your organizations secrets.

Read More »

Secure your cloud environment with ActWise

More and more companies are operating in the cloud and using cloud providers such as AWS, Azure, and Google. These environments offer great flexibility but also introduce new security risks due to the critical infrastructure that is managed and the extensive user permissions they withhold. ActWise, an experienced partner of CyberArk, knows how to mitigate these risks using Secure Cloud Access as key solution to get a grip on the vast amount of cloud entitlements and better secure and control cloud console access. At the same time the solution will contribute to NIS2 compliance for your organization. Watch this video and discover how ActWise is the ideal partner to secure your cloud environment.

Read More »

Enhance Endpoint Security with ActWise

Securing privileged accounts and credentials is common sense these days, but are your application and machine accounts equally protected? Did you know there are often up to 45 times more machine identities than human identities and the vast majority of them has privileged entitlements? For this reason, these accounts existing in both static and dynamic environments often serve as an easy gateway for severe breaches as they are not sufficiently secured. With ActWise we implement CyberArk’s Secrets Management solutions to ensure both your applications and DevOps infrastructure and pipelines have their passwords rotated and secured. Moreover, these solutions contribute to the NIS2 compliance for your organization. Watch this video and discover how ActWise is the ideal partner to protect your organizations secrets.

Read More »

Ready to request your cyberark
dna scan at no cost?