Senior security consultant job description
Example senior security consultant requirements on a job description
- Bachelor's Degree in Computer Science or related field
- Minimum of 5 years of experience in IT Security
- CISSP or other security certification
- Knowledge of security frameworks, such as NIST and ISO 27001
- Extensive knowledge of security protocols and technologies
- Strong problem-solving skills
- Excellent communication skills
- Ability to work independently and as part of a team
- Attention to detail and strong organizational skills
- Ability to manage multiple projects simultaneously
Senior security consultant job description example 1
GuidePoint Security senior security consultant job description
Role and Responsibilities:
Deliver successful consulting engagements across multiple Governance and Risk offerings while maintaining a high degree of customer satisfaction. Perform maturity and risk assessments against NIST CSF, ISO 27001, and other best practice security frameworks. Establish strong relationships and trust with customers to understand customer's business environments and requirements. Develop information security policies, standards, plans, procedures, and other documentation to support customer adopted frameworks and industry standards. Review and develop Security Incident Response Plans and Runbooks. Work with other GuidePoint Security practices as part of a cohesive cross-functional team.
Experience and Education:
Minimum of 3 years of direct experience performing GRC-related consulting services for clients of various verticals, including financial and insurance, retail, healthcare, service providers (SaaS, PaaS, etc.), manufacturing, critical infrastructure/energy, etc. Minimum of 5 years of combined GRC experience across private/public sector, consulting and/or relevant education. Strong understanding and working knowledge of security frameworks including, NIST CSF, ISO 27K, and others. Strong understanding of all the functions within a security program, the ability to assess the maturity of a security program, and how to provide strategic recommendations and direction to senior leadership. Experience in reviewing and developing Security Incident Response Plans and Runbooks. Strong written and oral communication, which includes articulating thoughts and distilling complex problems into digestible information to be consumed by anyone from technical resources to the highest level of management; proven experience communicating clearly to technical levels up through C-Level and Board level. Strong written communication skills to aid in the creation of customer deliverables. Ability to provide presales support for Governance and Risk opportunities. Ability to contribute to practice and offering development. Remain current on industry developments and incorporate them into service delivery Strong ability to work independently and multi-task on multiple projects simultaneously. Personal drive and passion for growing themselves and the GRC Practice.
Preferred Experience and Position Requirements:
Demonstrated experience in assessing, developing, and implementing cybersecurity risk management programs that integrate with Enterprise Risk Management within an organization. Demonstrated experience with assessing, developing, and implementing data governance and protection programs, including conducting data discovery of data flows and inventories and evaluating the security and privacy controls that protect an organization's sensitive data. Demonstrated understanding and working knowledge of various risk assessment methodologies, using qualitative and quantitative risk analysis. Demonstrated experience with driving cybersecurity assessments for M&As for client organizations. Demonstrated experience leading the maturation of a security program within large organizations. Publish content and/or perform conference speaking to demonstrate thought leadership. Standard industry certifications are preferred, such as CISSP, CISA, CISM, CRISC, CBCP, GIAC, etc. Publish content and/or perform conference speaking to demonstrate thought leadership Conference speaking experience.
Why GuidePoint?
GuidePoint Security is a rapidly growing, profitable, privately-held value added reseller that focuses exclusively on Information Security. Since its inception in 2011, GuidePoint has grown to over 700 employees, established strategic partnerships with leading security vendors, and serves as a trusted advisor to more than 3,000 Enterprise-Level customers.
Firmly-defined core values drive all aspects of the business, which have been paramount to the company's success and establishment of an enjoyable workplace atmosphere. At GuidePoint, your colleagues are knowledgeable, skilled, and experienced and will seek to collaborate and provide mentorship and guidance at every opportunity.
This is a unique and rare opportunity to grow your career along with one of the fastest growing companies in the nation.
Some added perks....
Remote workforce primarily (U.S. based only, some travel may be required for certain positions, working on-site may be required for Federal positions) 100% employer-paid medical and dental premiums with generous employer family contributions 11 corporate holidays in 2022 (12 in 2023) and a Flexible Time Off (FTO) program Healthy mobile phone and home internet allowance Eligibility for retirement plan after 2 months at open enrollment Pet Care plan
Senior security consultant job description example 2
Palo Alto Networks senior security consultant job description
We're changing the nature of work. Palo Alto Networks is evolving to meet the needs of our employees now and in the future through FLEXWORK, our approach to how we work. From benefits to learning, location to leadership, we've rethought and recreated every aspect of the employee experience at Palo Alto Networks.And because it FLEXes around each individual employee based on their individual choices, employees are empowered to push boundaries and help us all evolve, together.
The Team
Unit 42 specializes in providing data breach response, digital forensics, and risk management consulting services to a growing list of clients ranging from small enterprises to Fortune 50 corporations around the world, as well as federal government agencies. Our experts combine deep security knowledge and proprietary technology to rapidly provide effective incident response, attack readiness, and remediation plans for organizations around the world. With offices in Reston, New York, Austin, and Los Angeles, we are firmly entrenched and well positioned as a leading provider of incident response.
Unit 42 is looking for Consultants to work with a single, long-term client across a wide-range of their unique security and regulatory needs. Unit 42 has nine distinct teams working on this engagement, and understands nobody will have all of the skills listed below - but the ability to be versatile and work across multiple teams is highly desirable.
The Role
Unit 42 is looking for someone who can help us help our clients better manage their data risk, exposure, and compliance obligations.
What You'll Do
Investigate mobile applications, websites, browser extensions, and other digital assets Leverage physical and emulated sandboxed environments for analysis Leverage proxy technologies to capture web traffic generated by applications Inspect web traffic logs to identify anomalous or suspicious activity Identify unauthorized exfiltration, handling, or use of end-user data including Personally Identifiable Information ("PII"), created content, credentials, etc Understand and adhere to best practices for operational security ("OPSEC") concepts Edit and write SQL queries or scripts to query APIs Review application source code and artifacts Reverse engineering of applications, tools, etc Leverage formal and informal internal documentation to quickly interpret unknown data behavior Create replicable processing scripts/notebooks, and document steps taken Help develop and refine ongoing data and code review strategies and workflows Regularly and uniformly report findings. Create a narrative to the analysis performed Understand how web requests are formed including POST parameters, HTTP headers, user agents, request parameters, request cookies, etc Query back-end databases using Presto SQL Utilize web logs to identify traffic and request patterns Review and validate external penetration test results to determine severity Actively participate in the development, documentation, and implementation of new processes to expand and mature capabilities for the organization. Continuous involvement in workstream growth and process improvement
Ideal candidate will have 4+ years of following:
Bachelor's Degree, or equivalent military experience, preferably in a technical or security-related field Knowledge of fundamental computer science concepts Positions or experience with corporate data environments, databases, and/or security experience preferred Analytical problem-solving skills, including how to interpret technical requirements and turn them into operational steps that can scale Ability to work both independently and as an effective team member, in a fast-paced environment. Strong multi-tasking and time-management skills Privacy or cybersecurity industry certifications are a plus Proven ability to work analytically while demonstrating effective leadership, project management, teamwork, and innovation. Experience in working with smaller teams and/or start-up organizations. Software development or scripting experience is a plus
All your information will be kept confidential according to EEO guidelines.
Covid-19 Vaccination Information for Palo Alto Networks Jobs
Vaccine requirements and disclosure obligations vary by country. Unless applicable law requires otherwise, you must be vaccinated for COVID or qualify for a reasonable accommodation if: The job requires accessing a company worksite The job requires in-person customer contact and the customer has implemented such requirements You choose to access a Palo Alto Networks worksite If you have questions about the vaccine requirements of this particular position based on your location or job requirements, please inquire with the recruiter.
Senior security consultant job description example 3
Pondurance senior security consultant job description
-
Minimum of 5 years experience performing Vulnerability Assessments, Penetration Tests, Wireless Security Testing and/or Configuration Review, and Social Engineering to enterprise organizations
-
Understanding of strategic and tactical remediation techniques and approaches
-
Ability to demonstrate creating comprehensive deliverables is required (e.g., Penetration Test Reports, Configuration Review Assessments, Vulnerability Assessments, Social Engineering Exercise Reports)
-
Demonstrated experience with thorough documentation and peer review processes as both the submitter and reviewer
-
Ability to work independently with no supervision as well as in team environments with more complex projects
-
Strong attention to detail as it pertains to the scope of the project, project management, and project documentation
-
Balancing multiple projects simultaneously with effective time management skills is required
-
Ability to follow, manage, update, and create well-defined methodologies across a variety of security testing disciplines
-
Strong and proactive communications with clients
-
Minimum of two years of experience in a consulting services role, or related information security position
-
OSCP, OSCE, GIAC, and CISSP Certifications are preferred but are not required
-
Bachelor’s Degree with disciplines in the area of Computer Science, Management Information Systems, Information Assurance, or Cyber Security are preferred
If you have other combinations of relevant skills and experience that you expect make you the right candidate for this role, please let us know.
Who we are:
At Pondurance we embrace, educate, and protect people by helping make our world a better and safer place. We believe in inviting good people into our company who are driven to become great !
Every person at Pondurance is encouraged to focus and grow in their individual areas of interest, passion, and career path . We have accessible leaders as Mentors who believe “None of us are as smart as all of us” (R. Pelletier).
We believe everyone has the freedom to be themselves , especially at work and so we embrace, support, and celebrate each other. Each one of us influences our company’s direction through speaking up, you have a voice and we want you to use it.
Do you want to be a part of something different? Do you want to influence real change? Do you want to be part of the solution? Then join us in redefining the security and cyber risk landscape.
What We Offer:
The opportunity to apply your expertise, take on new challenges, and help customers address their biggest security objectives.
An inclusive culture of teamwork that embraces the diversity of our people and communities in which we work.
Some of the corporate benefits (there are more) for full-time employees include:
-
Medical, dental, vision, disability, FSA, HSA, life and AD&D insurance, 401(k) Plan
-
Time off: PTO, sick, holiday, & parental leave details are available
-
Money: We provide competitive compensation packages based on the market and your overall credentials.
You will likely be based out of one of our current locations: District of Columbia (DC), Maryland (MD), Virginia (VA), Indiana (IN), Florida (FL), and Texas (TX), however we are open to remote.
To promote a healthy and safe work community we require background and drug screenings as part of our hiring process. Details of our process will be provided upon request.
We are an equal opportunity employer focused on celebrating diversity and inclusion. We believe that each individual should be treated equally without regard to race, color, identity, national origin, protected veteran status, religion, sex including sexual orientation and gender identity, disability, or any other characteristic protected by law.
Powered by JazzHR
QGcmD1cYVP