Requirements
- •Bachelor's degree in Computer Science, Information Systems, Cyber-security, related technical field, or equivalent practical experience
- •8 years of experience assessing and developing cyber-security solutions and programs across security domains
- •8 years of experience in delivering cyber outcomes, identifying mission risks, and devising solutions
- •3 years of experience with security frameworks (e.g., ISO27001, and NIST 800-53)
- •3 years of experience in designing and operating security program functions, including cyber defense operations, incident response, architecture, identity and access management, vulnerability management, or security risk management
- •Ability to travel up to 30% of the time as needed
What You'll Do
- •Provide guidance on building or transforming cyber security programs and the implementation of technologies used for enterprise security
- •Provide advice on best practices for managing the cyber security risks during digital transformation
- •Conduct security reviews and maturity assessments across technology and Business teams to address cyber risk
- •Provide clear and organized risk findings and recommendations to clients
- •Interface with clients to address concerns, issues, or escalations, track and drive to closure any issues that impact the service and its value to clients
- •Evaluate client needs, coordinate design for a solution, and clearly communicate the value proposition of complex and highly technical subjects
- •Implement or assess existing security controls
- •Lead and support projects on behalf of clients that assess, test, or build their security programs
- •Provide guidance and advice to clients on best practices and managing the risks for their security program
- •Help clients effectively prepare for, proactively mitigate, and detect and respond to cyber-security threats
Nice to Have
- •Experience implementing industry-leading practices around cyber risks and cloud security for clients’ cloud security frameworks using industry standards
- •Experience with cloud governance, with the ability to convey governance principles to cloud computing in terms of policies
- •Knowledge of technologies used in pen testing, security event analysis, incident response, computer forensics, network and endpoint architecture, or other security operations (SecOps) areas
- •Knowledge of infrastructure, operating system and application vulnerabilities, security architecture, and controls
- •Knowledge of cyber threat landscape
- •Ability to communicate with clients in a concise manner while managing expectations at both executive and technical levels
