FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Information Security Consultant

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Information Security Consultant Skills

Below we've compiled a list of the most important skills for a Senior Information Security Consultant. We ranked the top skills based on the percentage of Senior Information Security Consultant resumes they appeared on. For example, 7.4% of Senior Information Security Consultant resumes contained Ensure Compliance as a skill. Let's find out what skills a Senior Information Security Consultant actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Information Security Consultant:

1. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Information Security Consultant jobs:
  • Serve as Program Owner, maintaining program documentation, procedures, and processes to ensure compliance in business and regulatory drivers.
  • Monitored the security of critical systems & changes to sensitive computer security controls to ensure compliance.

Show More

2. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Senior Information Security Consultant jobs:
  • Promote security awareness throughout the organization and assist with risk assessments.
  • Performed emergency forensic analysis and assisted teams with risk assessments.
  • Provided technical risk assessments and suggestions for building different landscapes.
  • Provide GAP analysis, risk assessments, and compliance reviews to assist clients in meeting regulatory statutes.
  • Lead or execute compliance audits and risk assessments within established control areas.
  • Conduct Risk Assessments utilizing NIST Guidance 800-30.

Show More

7 Risk Assessments Jobs

No jobs at selected location

3. Audit Procedures

demand arrow
high Demand

4. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Senior Information Security Consultant jobs:
  • Performed and created procedures for system security audits, penetration-tests and vulnerability assessments.
  • Completed daily and periodic vulnerability assessments/penetration tests of internet and intranet servers.
  • Performed application vulnerability assessments for Fortune 500 companies.
  • Performed vulnerability assessments on DIT GOTS applications.
  • Conducted penetration and vulnerability assessments as required.
  • MAJOR ACCOMPLISHMENTS Technical lead of a team dedicated to providing application vulnerability assessments for a Fortune 50 Financial Company.

Show More

5. Firewall

demand arrow
high Demand
Here's how Firewall is used in Senior Information Security Consultant jobs:
  • Developed Cisco firewall policy and maintenance plans.
  • Maintain WAF for Ecommerce application, IPS configuration and monitoring, Firewall auditing and Disaster Recovery planning.
  • Installed personal firewalls on ATO tax agent systems around Sydney and Parramatta.
  • Experience Web Application Firewall such as Imperva, Fortify Defender etc.
  • Use Skybox to analyze and adjust firewall and network posture.
  • Engaged in Firewall rule optimization project to transform perimeter security across Cisco ASA, Juniper Netscreen SSG platforms.
  • Reviewed and approved Check Point and Cisco firewall rulesets prior to migration..

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. Nist

demand arrow
high Demand
Here's how Nist is used in Senior Information Security Consultant jobs:
  • Performed independent verification and validation on information systems for the National Aeronautics and Space Administration (NASA).
  • Network Security Administrative duties included vulnerability assessment of networks, operating systems and applications.
  • Performed advanced Windows / Exchange / File Share system and security administration.
  • Group Policy (Domains & Organizational Units) - Administration.
  • Organized NIST 800-53A lifecycle security activities: information categorization, audit, inventory and configuration management support.
  • Provided HelpDesk support for CA-ACF2 Administration, Entrust Administration, Extranet Certification, and Single Sign-on point of contact.
  • Provided Information Security Accrediation & Certification NIST 800-53r4 RMF Services for over 100 C&A packages.
  • Provided technical support for eTrust and LAN administration.
  • Subject Matter Expert (SME) in Information Security Administration for IBM midrange servers AS400 (aka iSeries).

Show More

7. Security Assessment

demand arrow
high Demand
Here's how Security Assessment is used in Senior Information Security Consultant jobs:
  • Originated and carried out a business process improvement task to facilitate automation of software security requests and vendor security assessments.
  • Performed comprehensive security assessment of all designs within customer networks and advised on mitigation strategies for network vulnerabilities.
  • Write formal security assessment reports for applications by providing professional analyses regarding vulnerabilities and risk mitigation recommendations.
  • Conduct Information Security assessments at a variety of clients such as banks and hospitals.
  • Execute physical security assessments and C&A boundary discussions.
  • Performed security assessments for the client-facing apps.
  • Conducted Network Security Assessment for the first foreign own telecommunications corporation, (Primary carrier) according to agreement.
  • Conduct enterprise network and security assessment for 1100 node WAN with 60,000 employees.

Show More

8. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Senior Information Security Consultant jobs:
  • Designed, implement and developed network monitoring solutions for the Network Monitoring Center's computer infrastructure.
  • Coordinated with external vendors in the analysis and procurement of new technologies and infrastructure.
  • Designed, implemented and developed monitoring solutions for the agency's infrastructure.
  • Managed large technical security audits of virtual and physical infrastructures.
  • Partner with infrastructure teams to ensure that policies, procedures and control deficiencies are being actively managed to a satisfactory level.
  • Participated in the implementation of SafeNet product for encrypting customer credit card information using Public Key Infrastructure (PKI).
  • Coordinated with Oracle OnDemand services the essential communications and infrastructure for the new IVU taxation systems remote support.
  • Engaged with IT Security, IT Infrastructure, IT operation, IT Architecture, to ensure ITGCC compliance.
  • Tasked over $6 million worth of vehicles and IT infrastructure equipment in support of high impact teams.
  • Implemented of NTP services over entire network and server infrastructure.
  • Formalized bases line IT security policies and procedures, and best practices for Visa's complex database infrastructure.

Show More

9. Information Security Policies

demand arrow
high Demand
Here's how Information Security Policies is used in Senior Information Security Consultant jobs:
  • Participate in the development of Information Security Policies.
  • Authored Information Security Policies and Standards.
  • Reviewed new technology request to ensure compliance with NIST and DoL Information Security policies.

Show More

7 Information Security Policies Jobs

No jobs at selected location

10. PCI DSS

demand arrow
high Demand
Here's how PCI DSS is used in Senior Information Security Consultant jobs:
  • Achieved significant cost savings by managing PCI DSS and PA-DSS assessment and remediation processes and actions.
  • Use independent judgment to confirm PCI DSS requirements have been met.
  • Conducted PCI DSS gap analyses and compliance assessments.

Show More

11. Information Technology

demand arrow
high Demand
Here's how Information Technology is used in Senior Information Security Consultant jobs:
  • Advocated the use of proper Information Security practices through consulting activities with Line of Business and Information Technology personnel.
  • Standardized all Information Technology Menus across AS400s.

Show More

12. Risk Management

demand arrow
high Demand
Here's how Risk Management is used in Senior Information Security Consultant jobs:
  • Provided advanced information security risk assessment consultation for all aspects of information security compliance policy, risk management and remediation.
  • Lead the professional services team in achieving customer requirements with implementing information security, risk management and compliance management programs.
  • Advise Business divisions on Information Security risks and mitigating controls for them to make informed risk management decision.
  • Developed strategies to comply with privacy, risk management and e-authentication requirements.
  • Performed Risk Management and created new business continuity planning.
  • Manage IA Governance, Risk Management, and Compliance efforts in support of the MetLife s Global IT Security program.
  • Conduct C&A efforts accordance with DIACAP and the Risk Management Framework Process.
  • Provided risk management and compliance expertise for internal business partners and project teams.
  • Key achievements: Review and implementation of new Information Security Risk Management and Secure SDLC Standards.

Show More

1 Risk Management Jobs

No jobs at selected location

13. Architecture

demand arrow
high Demand
Here's how Architecture is used in Senior Information Security Consultant jobs:
  • Worked closely with each client to devise and implement corporate wide security architectures and disaster recovery plans.
  • Provide application and architecture security reviews and identify recommendations for improvements.
  • Designed web-based security networks and architecture for secure on-line transactions.
  • Provided high-level security architecture support for projects.
  • Reviewed and approved tier architecture.
  • Work with clients to understand the nature and purpose of their application as wells as review the application architecture.
  • Generated ISSO subject matter expertise input to DHS and CBP IT security architecture governance documents as required.
  • Designed the architecture and managed the deployment of SecurID(RSA) Two-Factor Authentication systems.
  • Managed and delivered risk assessment for projects, architectures and business systems for clients.
  • Developed IT architecture deliverables, specific to information security countermeasure implementations, for operational systems and systems under development.
  • Designed the firewall architectures and deployed the firewalls (Sonicwall, Watchguard), including site-to-site and client VPNs.

Show More

14. ISO

demand arrow
high Demand
Here's how ISO is used in Senior Information Security Consultant jobs:
  • Used components of ISO/IEC 27001 series, COBIT, and ITIL as references for security risk assessment report and policies.
  • Acted as liaison between Freddie Mac application teams, management & auditors, in validating, testing and resolving exceptions.
  • Act as a liaison & SME for internal departments & vendors to successfully manage Vendor Risk Assessment.
  • Provided senior level IT security liaison and support services to company project teams for business development.
  • Perform ISO 27001 based Policy and Strategy Analysis for Provincial and Local Governments in South Africa.
  • Reported to the Global CISO, Global GTO, and the Global Services Project Executive.
  • Developed security policies and standards based on FISMA, COBIT and ISO2700x control standards.
  • Assess risks in line with the questionnaire responses and evidences to meet ISO requirements.
  • Conducted ISO 27001 gap analyses and client internal ISO 27001 ISMS audits.
  • Perform ISO testing to ensure compliance with security framework controls.
  • Served as Help Desk supervisor during normal and shift hours.
  • Identify ISO compliance gaps and propose acceptable remediation activities.
  • Utilized standard frameworks & guidelines such as ISO27001, OUM, NIST, ASD, PSR and NZISM.
  • Followed ITIL, ISO 22301 & 27001, FFIEC, NIST 800 Series Standards
  • Acted as a liaison & Subject Matter Expert for internal departments and vendors to successfully perform Onsite Risk Assessments in USA.
  • Lead client team in the development and implementation of the ISO 27000 Security Management System framework.
  • Act as Guardium technical advisory to the Pre-Sales, Post-Sales and Sales Teams.
  • Mentor, Advisor and Solution oriented implementer.

Show More

1 ISO Jobs

No jobs at selected location

15. Hipaa

demand arrow
average Demand

16. Assurance

demand arrow
average Demand
Here's how Assurance is used in Senior Information Security Consultant jobs:
  • Provided Information Assurance support for the development and implementation of security architectures to meet new and evolving security requirements.
  • Conducted technical information security and assurance concepts to non-information security individuals to improve overall security awareness for NITC.
  • Provided senior-level information assurance services for large-scale Federal and Commercial Banking information systems.
  • Perform activities such as Certification and Analysis, DITSCAP, IT Security, NIST, Information Assurance.
  • Provided timely Information Assurance (IA) to Coast Guard and Customs and Border Patrol in DHS.
  • Provide Information Assurance objectives to clients involved in securing their networks and information.
  • Provide quality assurance and technical review of client deliverables and internal documentation.
  • Delivered security assurance consultancy to internal Datacom teams and to external customers.

Show More

17. Fisma

demand arrow
average Demand
Here's how Fisma is used in Senior Information Security Consultant jobs:
  • Developed Disaster Recovery and Contingency plans in accordance with NIST SP 800-34 as mandated by OMB A-130 section III and FISMA.
  • Researched, generated and prepared the DOT Quarterly and Annual FISMA Reports for submission to OMB.
  • Assist in obtaining and updating security and accreditation plans required by FISMA and DOL.
  • Review MDHE contractors for FISMA compliance.
  • Managed team efforts, and provided compliance and oversight review of FISMA reportable elements.

Show More

18. Security Requirements

demand arrow
average Demand
Here's how Security Requirements is used in Senior Information Security Consultant jobs:
  • Coordinated Security Requirements and consulted with system developers for 50 new applications - Main POC for Enterprise Security Architecture.
  • Conducted assessments of existing IT architecture for compliance with security requirements from applicable security frameworks.
  • Perform analyses to validate established security requirements and recommend additional security requirements and safeguards.
  • Participated on the agencies product review board to determine security requirements for planned and existing information technology projects.

Show More

19. Security Standards

demand arrow
average Demand
Here's how Security Standards is used in Senior Information Security Consultant jobs:
  • Reviewed and recommended annual changes to Corporate Information Security Standards policy.
  • Drafted enterprise security standards and guidelines for system configuration.
  • Assisted with the development, implementation, monitoring and maintenance of all information security standards, policies, and procedures.
  • Managed security assessments to ensure compliance to firm's security standards (i.e., OWASP Top 10, SANS25).
  • Created of different network security standards documents based upon PCI standard and implemented the same on all in-scope infrastructure devices.
  • Review the firewall work intake with the information risk management security standards and ensure the requests are in compliant.
  • Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments.
  • Perform Reports on Compliance regarding PCI Data Security Standards (DSS).
  • Assessed the customer's level of compliance with applicable security standards.

Show More

20. SOX

demand arrow
average Demand
Here's how SOX is used in Senior Information Security Consultant jobs:
  • Ensured IT security and SOX Compliance requirements are implemented in New Systems, Enhancements and Upgrades.
  • Monitored ITGCC controls to avoid vulnerabilities or issues and sustain SOX, PCI and PII Compliance.
  • Audited and recommended controls to mitigate risks and achieve compliance with SOX and GLBA regulations.
  • Provide SOX-COBIT subject matter expertise to the client.
  • Managed the SOX Application Profile Revalidation review.

Show More

2 SOX Jobs

No jobs at selected location

21. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Senior Information Security Consultant jobs:
  • Collaborated & developed Corporate Incident Response Strategy, organization, process, & requirements.
  • Maintain active understanding of industry practices for secure software development and incident response.
  • Provide applications security incident response to detection, analysis and containment.
  • Provided in depth analysis of OpenNet and Classified environments while developing Standard Operating Procedures (SOP) with security incident response.
  • Responded to computer security incidents according to the Computer Security Incident Response Policy (CSIRP).
  • Managed processes and lead all efforts for computer security incident response team.
  • Validated and maintain incident response plan and processes to address potential threats.
  • Designed and built Incident Response programs.

Show More

22. System Security

demand arrow
average Demand
Here's how System Security is used in Senior Information Security Consultant jobs:
  • Designed and implemented system security controls via security templates.
  • Identify and coordinate the physical and system security requirements required to implement DOL Enterprise Network connection to state workforce agencies sites.

Show More

23. Siem

demand arrow
average Demand
Here's how Siem is used in Senior Information Security Consultant jobs:
  • Managed integration into ArcSight SIEM platform for the Company security event logging and analysis.
  • Analyzed correlation rules developed for Security Incident and Event Management (SIEM) system.
  • Gained experience auditing several SIEM tools.
  • Implemented SIEM and syslog to adhere to the compliance.
  • Project Manager for Tivoli Identity Manager and IBM ESSO rollout, Qradar SIEM and Source Fire IPS installation.

Show More

24. Windows XP

demand arrow
average Demand

25. Security Awareness

demand arrow
average Demand
Here's how Security Awareness is used in Senior Information Security Consultant jobs:
  • Co-developed and promoted enterprise-wide security awareness program.
  • Investigate potential security exceptions and manage the corporate security awareness program.
  • Provided training and bringing security awareness in all departments.
  • Developed and implemented an information security awareness outreach program.
  • Conducted Information Security Awareness Training Classes/Seminars.
  • Provide security awareness training, security best practices and processes education for internal staff and clients.
  • Train staff on security awareness and privacy policies.
  • Manage credit card and Identity theft Security awareness.

Show More

26. Cyber

demand arrow
average Demand
Here's how Cyber is used in Senior Information Security Consultant jobs:
  • Maintain an active working knowledge of federal and industry regulations affecting cyber security and privacy.
  • Integrate relevant federal agencies' cyber security suggested and mandated requirements into applicable documents.
  • Lead research and assess cyber-related policy, procedures, legislation and implementation directives.
  • Provide a variety of consulting services and technical guidance to the customer in the area of Cybersecurity / Information Assurance.
  • Subject Matter Expert (SME) for the Cyber Security Assessment and Management (CSAM) tool.
  • Job Description: Lead cybersecurity consultant responsible for performing information security reviews, events monitoring and information security investigations.
  • Provide Cyber Security controls gap analysis Test operations and remediation response program
  • Trained 10 Cybertrust consultants the necessary methodologies and techniques to provide security services to Cybertrust clients.

Show More

1 Cyber Jobs

No jobs at selected location

27. Project Management

demand arrow
average Demand
Here's how Project Management is used in Senior Information Security Consultant jobs:
  • Performed Project Management, Coordination and Technical Services related to Voice/Data implementations for major local companies.
  • Project Management; as a sole Washington based employee, manage multiple projects and clients in Washington and Alaska.

Show More

51 Project Management Jobs

No jobs at selected location

28. Security Plans

demand arrow
average Demand
Here's how Security Plans is used in Senior Information Security Consultant jobs:
  • Develop strategic security plans/recommendations for senior management.
  • Review the development, testing, and implementation of security plans, products, and control techniques.

Show More

29. Nessus

demand arrow
average Demand
Here's how Nessus is used in Senior Information Security Consultant jobs:
  • Used commercial scanning tools such as AppScan and Nessus to analyze systems for vulnerabilities.
  • Managed Qualys, Nessus, Retnia and Rapid 7 Nexpose vulnerability scans for 3 clients' environments.
  • Managed the vulnerability scanning (Rapid 7/Nexpose/metasploit, AppScan, Nessus, WebInspect, Scarab etc.

Show More

30. Application Security

demand arrow
low Demand
Here's how Application Security is used in Senior Information Security Consultant jobs:
  • Performed vendor and application security assessments based on a strict guideline of controls maintained by Zurich Insurance.
  • Performed internal security analysis, vulnerability analysis and application security testing.
  • Participated in Web Application Security Testing including the areas covering Mobile, Network, security, WIFI.
  • Lead design and define system and application security policies as well as security coding practices.

Show More

31. Access Control

demand arrow
low Demand
Here's how Access Control is used in Senior Information Security Consultant jobs:
  • Researched Network Access Control Appliances for integration of National Institute of Aging
  • Implemented Role Based Access Controls to limit developers.

Show More

32. Cloud

demand arrow
low Demand
Here's how Cloud is used in Senior Information Security Consultant jobs:
  • Coordinated security efforts in the migration of large data center into our highly virtualized cloud environment.
  • Experience in establishing compliance by leveraging HIPPAA framework Experience in AWS cloud based network security settings and compliance standards.

Show More

33. Security Personnel

demand arrow
low Demand
Here's how Security Personnel is used in Senior Information Security Consultant jobs:
  • Manage the Training of Information Security personnel on ALM Team.

Show More

34. SOC

demand arrow
low Demand
Here's how SOC is used in Senior Information Security Consultant jobs:
  • Executed social engineering exercises targeted at gaining sensitive information that may lead to a compromise of institutional security controls.
  • Provided in depth internal and external vulnerability testing, security awareness testing, and social engineering testing.
  • Conducted social engineering campaigns against enterprise users to train security awareness.
  • Evaluate third party vendors to ensure they meet AA standards and identify any associated risks.
  • Created associated documentation for identified vulnerabilities and POA&M items within each network.
  • Perform SOC1/SOC2 readiness reviews to assist client with upcoming external SOC audits.
  • Provided IT Security Management (ITSM) via SOC services to clients.
  • Assisted in remediation efforts for SSAE 16 SOC II Type I assessment.
  • Experience reviewing and ensuring SOC I/SOC II compliance for vendors.
  • Established a decent book of business in the SoCal area.
  • Performed analysis on vendor SSAE16 SOC1 and SOC2.
  • Conduct SSAE16 SOC1/SOC2 audit report reviews.
  • Provide thought leadership and create associated documentation such as presentations and whitepapers
  • Work onsite to collect relevant data, interview people associated to CDE environment and sample HW.
  • Liaised with external clients, agencies, other Datacom business areas and any associated third-parties.
  • Work with multiple associates to review evidence and complete ROCs.

Show More

35. IDS

demand arrow
low Demand
Here's how IDS is used in Senior Information Security Consultant jobs:
  • Analyzed and drilled down on security event data from the network (IDS sensors, firewall traffic and routers).
  • Installed and maintained security infrastructure including IPS, IDS, log management and security assessment systems.
  • Design and implement firewall rules in Check Point R77 & R75 firewalls and IDS blades.
  • Managed both internal and external security devices (Firewalls, IDS, etc).
  • Network Intrusion-Detection Systems (IDS/DIDS) and Host Intrusion-Detection Systems design and implementation.
  • Understand architecture, benefits/weaknesses, and configuration options of common IDS systems.
  • Designed and developed CL programs to disable privileged user ids daily.
  • Identified non-role based business end user ids across AS400 systems.
  • Configured, installed and troubleshoot IPS/IDS devices like Checkpoint Firewall and Endpoint, ArcSight, SourceFire, McAfee SIEM and Splunk.
  • Designed and implemented Symantec intrusion detection systems (HIDS), NetScreen IDP, and Cisco IDS solutions.

Show More

36. Ips

demand arrow
low Demand
Here's how Ips is used in Senior Information Security Consultant jobs:
  • Build strong cross-organizational relationships and effectively influencing staff across the IT organization and broader enterprise.
  • Contribute to the implementation of IPSoft IPCenter (IPWin/IPMon) for monitoring network/WinTel/Unix devices for Event and Incident Management.

Show More

37. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Senior Information Security Consultant jobs:
  • Worked with Active Directory Architect to develop a plan on implementing a modified business tree structure.
  • Designed, migrated, implemented, and secured global Active Directory network with 17,000 users for government client.
  • Lead Engineer for Exchange migrations and troubleshooting, network security, Active Directory, and Citrix.

Show More

38. Glba

demand arrow
low Demand

39. Unix

demand arrow
low Demand
Here's how Unix is used in Senior Information Security Consultant jobs:
  • Developed and implemented processes for monitoring UNIX Systems runs and how those changes are communicated to clients.
  • Served as backup to Unix Administrator and Disaster Recovery Coordinator for End Users.

Show More

40. RSA

demand arrow
low Demand
Here's how RSA is used in Senior Information Security Consultant jobs:
  • Track Governance, Risk and Compliance using eGRC RSA Archer Tool

Show More

41. Symantec

demand arrow
low Demand

42. Business Units

demand arrow
low Demand
Here's how Business Units is used in Senior Information Security Consultant jobs:
  • Provided investigation findings to relevant business units to help improve information security posture.
  • Coordinated efforts among multiple business units during response.
  • Manage relationships with mortgage and wholesales business units with regard to the Information Security Program.

Show More

43. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Senior Information Security Consultant jobs:
  • Work involved all the Cisco LAN switches, WAN routers, CheckPoint firewall configuration changes with proper ITIL process following.
  • Manage Cisco ASA and Checkpoint FW-1 firewalls.
  • Conducted checkpoint status review meetings.

Show More

44. Access Management

demand arrow
low Demand
Here's how Access Management is used in Senior Information Security Consultant jobs:
  • Led Identity & Access Management capability assessment for a 40-billion-dollar transportation company.
  • Experience with Identity and Access Management (IAM) and development of user roles and policies for user access management.
  • Developed the Accounts and Access Management Procedures.

Show More

45. SME

demand arrow
low Demand
Here's how SME is used in Senior Information Security Consultant jobs:
  • Provision assessment reports and executive summaries with recommendations & direction regarding remediation efforts and disposition of the third party.
  • Acted as principal SME for infrastructure server configuration hardening procedures for all operating systems platform security.
  • Preformed independent security audits identifying potential risks through thorough risk assessments for FDIC regulatory compliance.
  • Managed a team that performed an Internet security assessment for a national insurance company.
  • Performed security assessments and penetration tests of new and legacy technologies.
  • Assisted IT administrators in remedying security flaws discovered during risk assessments.
  • Performed Business Continuity and Disaster Recovery assessments.
  • Risk Assessment and Risk Management Activities - Perform risk assessments on IT infrastructure, web applications, vulnerabilities, and threats.
  • Led teams at client sites in performing and security assessments and audit reviews in the United States and Japan.
  • Completed PCI DSS risk assessment, application security testing, and penetration testing of MIT s payment card program.
  • Conducted security assessment of Cryptography applications including the apps that use Hardware Security Model (HSM).
  • Perform Information Security risks assessments on new projects (Innovation projects, cloud migration).
  • Managed all phases of the ESM-based UNIX, NT, and NetWare server security assessments.
  • Review vendor supplied policies & procedures, internal/external assessment reports, agreements and provide feedback.
  • Communicate, escalate, and track vendor progress on assessment remediation activities.
  • Performed Risk Analysis and Risk Assessments on financial systems and stand-alone platforms.
  • Perform annual audits and on site assessments of merchants and service providers.
  • Validate the scope of the security assessment containing Card Holder Data.
  • Provide Subject Matter Expertise (SME) in DIACAP, FISMA and NIST execution.
  • Designed, implemented and maintained an inter-connected multi-location lab environment used to test new assessment tools, techniques and exploits.

Show More

46. SQL

demand arrow
low Demand
Here's how SQL is used in Senior Information Security Consultant jobs:
  • Configured filters include URL categories and protocol filters for SQL NET databases, file transfers, and instant messengers.

Show More

47. Fips

demand arrow
low Demand
Here's how Fips is used in Senior Information Security Consultant jobs:
  • Developed and maintain the IT Security FIPS 199, CP and SSP.

Show More

48. Nmap

demand arrow
low Demand

49. POA

demand arrow
low Demand
Here's how POA is used in Senior Information Security Consultant jobs:
  • Develop security incident reports and documentations Plan of Action and Milestones (POA&M).

Show More

50. Configuration Management

demand arrow
low Demand
Here's how Configuration Management is used in Senior Information Security Consultant jobs:
  • Ensured that configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented.
  • Lead a team effort in developing the Testing and Configuration Management Procedures.

Show More

Senior Information Security Consultant Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Information Security Consultant

Ensure Compliance

10.7%

Risk Assessments

10.6%

Audit Procedures

8.0%

Vulnerability Assessments

6.3%

Firewall

5.7%

Nist

5.5%

Security Assessment

4.8%

Infrastructure

4.8%

Information Security Policies

4.8%

PCI DSS

4.5%

Information Technology

4.3%

Risk Management

4.1%

Architecture

4.0%

ISO

3.7%

Hipaa

3.6%

Assurance

3.5%

Fisma

3.3%

Security Requirements

2.6%

Security Standards

2.6%

SOX

2.5%
Show More

Typical Skill-Sets Required For A Senior Information Security Consultant

Rank Skill
1 Ensure Compliance 7.4%
2 Risk Assessments 7.4%
3 Audit Procedures 5.6%
4 Vulnerability Assessments 4.3%
5 Firewall 4.0%
6 Nist 3.8%
7 Security Assessment 3.4%
8 Infrastructure 3.4%
9 Information Security Policies 3.3%
10 PCI DSS 3.1%
11 Information Technology 3.0%
12 Risk Management 2.9%
13 Architecture 2.8%
14 ISO 2.5%
15 Hipaa 2.5%
16 Assurance 2.4%
17 Fisma 2.3%
18 Security Requirements 1.8%
19 Security Standards 1.8%
20 SOX 1.8%
21 Incident Response 1.8%
22 System Security 1.6%
23 Siem 1.5%
24 Windows XP 1.5%
25 Security Awareness 1.3%
26 Cyber 1.3%
27 Project Management 1.3%
28 Security Plans 1.2%
29 Nessus 1.2%
30 Application Security 1.0%
31 Access Control 1.0%
32 Cloud 1.0%
33 Security Personnel 1.0%
34 SOC 1.0%
35 IDS 1.0%
36 Ips 1.0%
37 Active Directory 0.9%
38 Glba 0.9%
39 Unix 0.9%
40 RSA 0.9%
41 Symantec 0.8%
42 Business Units 0.8%
43 Checkpoint 0.8%
44 Access Management 0.8%
45 SME 0.7%
46 SQL 0.7%
47 Fips 0.7%
48 Nmap 0.7%
49 POA 0.7%
50 Configuration Management 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

19,187 Senior Information Security Consultant Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.