FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Security Consultant

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Security Consultant Skills

Below we've compiled a list of the most important skills for a Senior Security Consultant. We ranked the top skills based on the percentage of Senior Security Consultant resumes they appeared on. For example, 7.7% of Senior Security Consultant resumes contained Ensure Compliance as a skill. Let's find out what skills a Senior Security Consultant actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Security Consultant:

1. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Security Consultant jobs:
  • Worked in close collaboration with business users to identify applications security holes, develop application submission policies and ensure compliance.
  • Conducted security assessment to ensure compliance to firm's security standards (i.e., OWASP Top 10).
  • Worked with products and solutions to ensure compliance with requirements.
  • Retested the controls post mitigation to ensure compliance.

Show More

2. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Senior Security Consultant jobs:
  • Performed network vulnerability assessments and remediation recommendations.
  • Completed network / application layer penetration tests as well as external and internal vulnerability assessments for assigned clients.
  • Conduct training and collaboration sessions for areas including web application testing, vulnerability assessments, and penetration testing.
  • Network scanning, network vulnerability assessments, audits and vulnerability resolution using commercial and open source tools.
  • Work on projects for multiple customers to perform internal and external vulnerability assessments and penetration tests.
  • Performed internal/external vulnerability assessments, analyze results and assembled report for presentation to client management.
  • Documented and delivered a report to CMS detailing the results of vulnerability assessments.
  • Perform internal and external vulnerability assessments and penetration tests.
  • Executed vulnerability assessments and evaluations for Fortune 500 clientele.
  • Performed ISO 27001 vulnerability assessments.
  • Conduct Risk and Vulnerability assessments and provide consultation to customers regarding integrated solutions (card access, CCTV, intrusion).
  • Managed compliance reviews, validation testing, and risk and vulnerability assessments in accordance with NIST standards for FISMA compliance.
  • Conducted Threat Analysis, Vulnerability Assessments, Pen Testing.
  • Performed internal and external vulnerability assessments using Nexpose vulnerability application.
  • Direct and conduct vulnerability assessments, compliance readiness assessments, penetration testing, data mapping and policy development engagements.
  • Performed Cyber Vulnerability Assessments at customer sites.

Show More

20 Vulnerability Assessments Jobs

No jobs at selected location

3. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Senior Security Consultant jobs:
  • Performed Information Security assessments of corporate server and network infrastructure, including security policies, procedures, and disaster recovery plans.
  • Developed and taught original course material on security architecture, secure software development practices, infrastructure design, and certification readiness.
  • Performed compliance efforts to determine SAS 70 requirement and produced audit artifacts within enterprise network and IT security infrastructure.
  • Develop and implement procedures that support the management, daily operations and technical support of the security infrastructure environment.
  • Created Portal roles/infrastructure for user management environment using Central User Administration (CUA) as the authentication medium.
  • Evaluate threats to infrastructure based on technology evolution curve, anticipated business models and competitive landscape changes.
  • Customized risk and threat analysis based upon vulnerabilities and threat for systems and infrastructure systems.
  • Network penetration testing of the external infrastructure of a major electronics manufacturer.
  • Managed and implemented server remediation and SAN storage upgrades for over 1,000 systems, securing the infrastructure.
  • Provided guidance on how moving SaaS application and infrastructure to cloud environments would impact our security posture.
  • Performed as lead in the Information Security Operations team in building the critical security infrastructure.
  • Perform duties as site manager and network engineering for IT network and infrastructure issues.
  • Managed switches, routers, firewalls and wireless infrastructure including patching and upgrades.
  • Perform penetration tests against Fortune 500 client's infrastructure and web applications.
  • Tested or reviewed all infrastructure from the Demarcation point inward.
  • network data security infrastructure/architecture deployment projects.
  • Co-authored the Microsoft Security Bootcamp for infrastructure engineering and application developers, sponsored by Microsoft.
  • Architected and domain administrator for VioPoint s internal network infrastructure.
  • Design, document, and implement infrastructures that allow seamless connectivity and optimal uptime.
  • Improved system efficiency and uptime by virtualizing the infrastructure (using VMware).

Show More

35 Infrastructure Jobs

No jobs at selected location

4. Firewall

demand arrow
high Demand
Here's how Firewall is used in Senior Security Consultant jobs:
  • Evaluate firewall change requests and assess organizational risks; Email security monitoring including message identification, notification searches and analysis requests.
  • Implement high availability solutions for redundant firewalls and virus scanners.
  • Identify systems that required live responses along with discuss server and firewall log information required.
  • Configured high availability clustering, OSPF routing, firewall zones/policies, and Screen/IDP features.
  • Conducted firewall and proxy infrastructure audits for multiple Fortune 500 companies.
  • Migrated Kluged Gauntlet and Checkpoint Firewall solution to Cisco Pix solution.
  • Support Raptor and Checkpoint firewall systems on a government contract.
  • Reduced network outages by identifying and resolving issues with firewall.
  • Monitored Firewalls with IBM's ISS Security Monitoring solution.
  • Re-architected agency firewall rules and policies.
  • Negotiated supplier support for firewalled configurations.
  • Helped customers with Cisco NAC, Cisco ASA, Checkpoint, Palo Alto and SonicWALL Firewalls, among others.
  • Used McAfee ePO Web Washer to manage firewall for users and deciding on which URLs to access network.
  • Utilized McAfee ePO to define HBSS rules and policies, using host intrusion prevention and host-based firewall.
  • Architected and implemented several firewall designs for financial, retail, and government clients.
  • Authored a firewall white paper for use on the company web site.
  • Provided Helpdesk support for firewalls, checkpoint on Unix Platform.
  • Reviewed rulesets to determine the security of the firewall.
  • Provide Nokia/UNIX Firewall Helpdesk support.
  • Developed firewalling solutions for TIBCO multicast trading data delivery networks and many other market data services not previously firewalled.

Show More

81 Firewall Jobs

No jobs at selected location

5. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Senior Security Consultant jobs:
  • Key accomplishments included assisting the organization in creating disaster recovery and security policies, procedures, and programs.
  • Provided comprehensive documentation outlining gaps and recommendation around industry best practice security policies, procedures and standards.
  • Collaborated with internal stakeholders to advance security policies, operational procedures, standards, and guidelines.
  • Reviewed, analyzed, and provided troubleshooting for various corporate security policies and deployments.
  • Designed and Developed Data Security policies for both High availability and Disaster Recovery.
  • Developed and documented security policies, procedures and standards.
  • Developed and delivered custom security policies for multiple clients.
  • Created testing Methodologies for testing implemented security policies.
  • Authored and co-authored multiple infrastructure security policies process.
  • Develop global/local security policies via GPO.
  • Authored, edited Security policies.
  • Rationalize and downsize number of security policies and standards from 100+ to 50 through document reviews, restructuring, and clean-up.
  • Administer and enforce security policies & procedures across all sites in my jurisdiction and conduct periodic reviews.
  • Formulate, adapt, and revise information technology security policies, guidelines, and procedures.
  • Performed ISO/IEC 27001 based assessment of security policies at a global financial investment firm.
  • Design, Develop and Maintain overall Network and Security policies.
  • Authored 25+ IT security policies and procedures for clients.
  • Designed security policies for use at fortune 500 companies.
  • Created and implemented security Policies, Procedures and methods.
  • Worked to identify security-related issues, assist with creating corporate security policies and remediation of deficiencies within each organization. "

Show More

64 Security Policies Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Information Security

demand arrow
high Demand
Here's how Information Security is used in Senior Security Consultant jobs:
  • Project management of enterprise technical writer's and creation of style guide to standardize documentation throughout information security programs and projects.
  • Prepared client presentations on emerging trends and situation-specific solutions for this entrepreneurial, Information Security Consulting Agency.
  • Participate in the design, development, and delivery of corporate information security architecture and strategy.
  • Present and share information security reports and briefings with senior management.
  • Provided Information Security Implementation, Deployment, Training and Awareness.
  • Provide technical information security guidance and recommendations on enterprise technologies.
  • Participate in the development of Information Security Policies.
  • Provide information security project management leadership.
  • Write PCI Report on Compliance for clients who require a Level 1 assessment Consult with clients regarding information security best practices.
  • Worked as a security lead to assist in developing and improving the company's Information Security program.
  • Led the PCI Compliance Team as a senior subject matter expert on PCI and Information Security.
  • Presented to industry associations on the topic of information security and its importance in the enterprise.
  • Assist in providing oversight for AT&T's Cloud offering around information security architecture.
  • Developed and led the 22 members of the SARCOM Information Security national practice group.
  • Provide counsel on information security and regulatory compliance to the client's managing director.
  • Implemented and managed the Information Security Third Party Risk Assessment process.
  • Developed Information Security Awareness and Training Programs for 12 State agencies.
  • Key Projects and Accomplishments Performed Information Security Training and awareness.
  • Worked for Accucode on limited engagement to work with and advise their clients on Information Security and Compliance Issues.
  • Provide world-class information security consulting services to Trustwave's US, Canada and Asia clients.

Show More

92 Information Security Jobs

No jobs at selected location

7. Security Audits

demand arrow
high Demand
Here's how Security Audits is used in Senior Security Consultant jobs:
  • Assist with remediation efforts and recommendations as it relates to external and internal security audits.
  • Conduct risk-based information security audits and assessments.
  • Participate in security audits and audit remediation.
  • Perform security audits of customer networks.
  • Perform security audits, vulnerability assessments, risk assessments and other consulting services for various clients in the Mid Atlantic area.
  • Point of Contact for Security audits and issues for critical SAP systems.
  • Performed other types of Information Security audits upon client requests.
  • Conducted security audits of multiple USAF enclaves.
  • Assisted in security audits and risk analysis.
  • Risk assessments, threat and vulnerability assessments, cyber- vulnerability assessments, cybersecurity audits and security program development.

Show More

1 Security Audits Jobs

No jobs at selected location

8. Security Consultant

demand arrow
high Demand
Here's how Security Consultant is used in Senior Security Consultant jobs:
  • Lead Security Consultant for team developing security policy to bring customer into compliance with Government regulations.
  • Served as an internal information security consultant to the organization.
  • Serve as Project Director, Manager and Senior Security Consultant
  • Promoted to Senior Security Consultant.
  • Served as security consultant for numerous multinational companies, during the construction of the longest oil/gas pipe line in Latin America.
  • Worked with a team of other security consultants to update a company's existing security policy documents.
  • Lead support for team of security consultants supporting enterprise, mainframe, and VPN.
  • Position: Security Consultant sales- meet & exceed monthly sales and annual sales quota.
  • Serve as subcontractor and Security Consultant on a corporate level to diverse enterprises.
  • Promoted from Security Analyst to Senior Security Consultant in 2004.
  • Managed Project teams Security Consultants for regular field work.
  • Manage teams of security consultants and analysts.
  • Contract Completed) Information Security Consultant
  • Assisted with training and orientation of new security consultants Exceeded sales quota for 36 consecutive months.
  • Lead Security consultant for a team of 7 Security Risk Analysts representing 5 states..
  • Operated on a one-year contract as a FishNet Security Consultant for customers AARP, Sungard and Arvato.

Show More

98 Security Consultant Jobs

No jobs at selected location

9. PCI DSS

demand arrow
high Demand
Here's how PCI DSS is used in Senior Security Consultant jobs:
  • Assigned to remediation efforts for clients and customers based on PCI DSS Assessments completed by the QSA team.
  • Assisted several clients with PCI DSS Compliance Remediation from assessment to filing Report on Compliance (ROC).
  • Conducted PCI DSS audits for Level 1 merchants and documented Report on Compliance (ROC).

Show More

13 PCI DSS Jobs

No jobs at selected location

10. Access Control

demand arrow
high Demand
Here's how Access Control is used in Senior Security Consultant jobs:
  • Specialized in business continuity and disaster recovery preparation solutions via hosted and Cloud / SaaS based surveillance and access control systems.
  • Established Texas-based national insurance corporation account for access control and video surveillance in several cities.
  • Reviewed architecture for authentication, authorization, data privacy, and access control.
  • Developed interstate financial account for access control and video surveillance.
  • Engineered and designed security systems (access control, CCTV, fire and intrusion alarms) for commercial and residential customers.
  • SAP GRC: * Responsible for the design, develop, test and implementation of the GRC 10 Access controls capabilities.
  • Installed, serviced, and sold Fire Alarm Systems, Burglar Alarm Systems, Access Control Systems, and CCTV systems
  • Network Access Control technologies Installation, testing and implement systems software including: customization, documentation resolution and support:.
  • Review and consult on designs for Security Systems, including video surveillance, access control, and intrusion detection systems.
  • Set global standards for security software, intrusion detection, anti-virus, access control, and secure logging.
  • Advise clients on security policies, best practices, security event management, and access control policies.
  • Account Management and Sales of Access Control, Intrusion, Fire, Video and Integrated Security Solutions.
  • Maintain role based access control (RBAC) for all Epic environments and manage related activities.
  • Provide integrated access control, CCTV and intrusion solutions for a variety of clients.
  • Provided security design for Access control, CCTV, Fire and Intrusion systems.
  • Set up Access Control Owners.
  • Used PLM authorization and Access control feature from PLM 7.0 Used Access control feature on individual objects.
  • Involved in Designing strategy & roadmap for SAP GRC 10 Access Control and role restructuring.
  • Implement access controls on the servers to ensure that the servers are Sox audit Compliant.
  • Deployed access control lists (ACLs), virtual local area networks (VLANS) and SIEM appliance.

Show More

16 Access Control Jobs

No jobs at selected location

11. SOX

demand arrow
high Demand
Here's how SOX is used in Senior Security Consultant jobs:
  • Participated extensively with external PCI and SOX audits by developing audit evidence and coordinating with internal compliance teams.
  • Provided implementation guidance to clients for Section 404 & 302 (SOX Compliance) pertaining to Enterprise user Identity Management.
  • Advised clients on how to achieve and maintain PCI & SOX compliance as well as IT Security best practices.
  • Subject Matter Expert on Physical Security for regulatory compliance (SOX, NERC and FERC).
  • Validated policies and practices instituted to restrict user access to financial or SOX relevant systems.
  • Presented role change proposals for audit findings for segregation of duties and SOX compliance.
  • Ensured FISMA/NIST, HIPAA, SOX regulations through project governance and risk compliance.
  • Performed IT General Control and IT Application Controls for annual SOX audits.
  • Addressed all requests for SOX audits requests for all SAP systems.
  • Designed and implemented Database Backup Policy for all SOX compliant databases.
  • Provided implementation guidance for Section 404 & 302 (SOX Compliance)
  • Evaluated SOX configurable controls document to include specific SAP transactions.
  • Assist in setting strategies for PCI and SOX compliance.
  • Perform SOX 404 audit testing and documentation.
  • Conducted pre and post testing of administrative and application controls to ensure SOX compliance.
  • Experienced with Sarbanes Oxley (SOX) and segregation of duties (SOD's).

Show More

12. Nist

demand arrow
high Demand
Here's how Nist is used in Senior Security Consultant jobs:
  • Designed and implementation of roles and user administration solutions for new applications and transition of process to appropriate administration teams.
  • Coordinate major investigation of administrative error that left major web hosting provider site vulnerable to effected malicious code.
  • Spearheaded Strategic/Tactical planning efforts and implemented industry best practice efforts for the Veterans Administration.
  • Included responsibility for all normal office administration.
  • Created security certification documents using NIST.
  • Served as a Senior Consultant for the Social Security Administration Office of Compliance and Oversight / Office of Information Security.
  • Provided direct client support as the Content Administrator for the SecureInfo RMS C&A tool to DHS.
  • Control all day-to-day operations including billing, budget, customer relations, marketing, social media and administration.
  • Reviewed System Security Plans, Security Categorization, verifying correct NIST SP 800-53 security controls were selected.
  • Assist in design & document preparation, enhancement of SAP security administration policies, processes and procedures.
  • Designed SNMP Configurations for the network devices to map access with the management and administrative workstations.
  • Reviewed and designed the organization's policies for compliance with the regulations based on NIST 800-171.
  • Developed, implemented and administered strategic marketing plan for the Central New York Office.
  • Used Octave methodology and NIST 800-26/30/53 to assess agencies' security posture.
  • Performed SAP License Administration analysis, implementation and submission to SAP.
  • Reviewed OS and Application hardening standards according to published NIST standards.
  • Identified School and Administrative User Functional Groups.
  • Enabled NATO ePO infrastructure to optimize centralized/federated reporting and consolidate client management with delegated administration.
  • Managed and administered Tivoli Access Manager for e-business 6.1 and Tivoli Identity Manager 5.1 in several customer environments using AIX.
  • Implemented ACLs in remote and Administrative facilities, Data Center and CoLo Tested ACL configurations.

Show More

27 Nist Jobs

No jobs at selected location

13. Hipaa

demand arrow
high Demand
Here's how Hipaa is used in Senior Security Consultant jobs:
  • Developed database applications using Microsoft Access for conducting PCI assessments and HIPAA assessments.
  • Designed and delivered 25+ classes on HIPAA regulations to students for a medical transcription training school within 2 years.
  • Created training and awareness program to ensure all BioSpace team members were proficient in all HIPAA controls for compliance.
  • Performed Gap Analyses, PCI and HIPAA audits and Policies and Procedures for Fortune 100 companies.
  • Assisted in HIPAA and PCI DSS compliance strategy and audit tool development.
  • Provide customized policies and procedures for multiple clients to meet HIPAA requirements.
  • Conducted IT related HIPAA audits.
  • Perform Risk & Compliance Analyses for HIPAA, ISO 27000 series and other standards.
  • Network vulnerability analysis and HIPAA and FDA compliance gap analysis for a new product implementation of a large healthcare technology company.
  • Assist Program Manager with coordination of Meaningful Use risk assessments concerning HIPAA requirements for large Healthcare Corporation.
  • Consulted with two, global Fortune 500 companies for HIPAA data center and/or business process risk assessments.
  • Conducted SOC Type I and Type II reports for service providers Conducted HIPAA assessments and pre-assessments

Show More

14. Risk Management

demand arrow
high Demand
Here's how Risk Management is used in Senior Security Consultant jobs:
  • Evaluate safety and risk management programs and implement training and operational procedures to aide compliance with industry standards.
  • Developed and delivered an ISO27k risk management framework for an Egyptian Oil/Gas refining company.
  • Gained experience in working with auditors and non-technical risk management professionals, network forensics.
  • Directed the planning, formulation and implementation of a comprehensive risk management program.
  • Provided application security testing services and risk management strategies.
  • Provide high risk assessments in all areas of K&R, risk management, and emergency safeguards.
  • Risk Management work has resulted in a cost savings for the company in excess of 250,000.00.
  • Analyze an array of federal and commercial clients' business environment and basic risk management approaches.
  • Developed & Implemented Enterprise Risk Management Framework based on COSO and FISMA
  • Develop security-focus whitepapers on Continuous Monitoring with Risk Management Framework and using the Cloud to achieve HIPAA/HITECH privacy requirements.
  • Developed and documented requirements utilizing Deloitte & Touche, LLP methodology for IT Risk Management use cases.
  • Project Phase: Pre Go-Live Defined overall SAP security risk management profile for SAP implementation for clients.

Show More

12 Risk Management Jobs

No jobs at selected location

15. Security Assessment

demand arrow
average Demand
Here's how Security Assessment is used in Senior Security Consultant jobs:
  • Performed regular security assessments and penetration testing of all applications and services to certify the effectiveness of defense systems.
  • Conducted a high-level security assessment documenting security strengths and weaknesses, and provided detailed report to the customer.
  • Established standardized processes and procedures for service delivery of IT security assessment and technical vulnerability assessment engagements.
  • Verified pricing and sizing information for each security assessment to ensure proper alignment with contract.
  • Mentored and trained additional consulting resources within the western region to perform security assessments.
  • Performed penetration tests and other deep security assessments against infrastructure and web applications.
  • Completed security assessments for multiple companies to satisfy regulatory and auditing guidelines.
  • Performed and delivered client security assessments.
  • Perform regular Business Security Assessments.
  • Update and create security artifacts for information systems including System Security Plan, Risk Assessment Report, and Security Assessment Reports.
  • Contribute to the development and continuous improvement of the Security Assessment practices through various team and industry contributions.
  • Conducted security assessments of agency systems, applications, and environments against sets of NIST security controls.
  • Developed detailed Security Assessment Plan (SAP) deliverable using GSA BPA templates for Cloud Service Providers.
  • Conduct security assessments and made recommendation on data/voice network (LAN, WLAN, DMZ).
  • Performed >100 IT security assessments, PCI audits, compliance validations, and more.
  • Conducted ISO 27002 security assessments, providing detailed findings, risks and recommendations.
  • Delivered multi-platform security assessments and integrated implementations focusing on policy compliance.
  • Obtained the PCI ASV certification for Forsythe so that we were able to perform PCI Quarterly Security Assessments.
  • Performed a security assessment for a financial services client and discovered multiple backdoors to systems left by an ex-employee.
  • Perform vulnerability scans with Rapid7 Nexpose and penetration tests with Rapid7 Metasploit Performs vendor security assessments and project security assessments.

Show More

26 Security Assessment Jobs

No jobs at selected location

16. Risk Assessments

demand arrow
average Demand
Here's how Risk Assessments is used in Senior Security Consultant jobs:
  • Conducted extensive internal and external penetration/vulnerability testing on infrastructure, application and wireless security, and risk assessments on distributed networks.
  • Performed risk assessments and recommended mitigation strategies * Verified security controls to support compliance with regulatory requirements.
  • Conduct in-depth risk assessments and designed physical and operational measures to mitigate same.
  • Conducted countless information security and risk assessments.
  • Handled threat vulnerability and risk assessments.
  • Conduct technical security and risk assessments.
  • Performed IT Controls Audits and Risk Assessments primarily within the FFIEC and GLBA framework for banks and credit unions.
  • Perform risk assessments using frameworks NIST 800-53, SANS Top 20 Critical Controls, and BITS Shared Assessments.
  • Risk Assessments - Designed managed and implemented risk assessment processes that were used within client computing infrastructure.
  • Perform risk assessments, risk remediation, and implement security best practices workstations and servers.
  • Conduct privacy risk assessments and develop controls to comply with sector specific privacy laws.
  • Performed research and analysis of fraud issues through Crime Risk Assessments.
  • Developed Business Contingency Plans and Risk Assessments for clients.
  • Risk assessments for a range of technologies.
  • Perform application threat modeling and risk assessments.
  • Created processes and proceedures with problem management and change management * Performed qualitative Risk assessments
  • Conduct multi-level threat and risk assessments for Fortune 500 clients.
  • Manage audit schedule to perform third party IT risk assessments.
  • Supported the sales team in a pre-sales role Performed risk assessments and remediation recommendations.

Show More

17. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Senior Security Consultant jobs:
  • Developed custom security policies and plans; including incident response, business continuity, disaster recovery, and security awareness.
  • Created Security Policies including corporate password requirements, corporate WiFi Standard, Incident response procedures and vulnerability management process.
  • Network vulnerability assessment and assisting with incident response for a major non-profit research organization.
  • Provide security incident response working with firewall logs, and investigating security events.
  • Lead and/or participate in information security incident response and handling.
  • Developed and managed Incident Response Training service offering.
  • Established an effective incident response capability.
  • Manage security operations and incident response.
  • Assisted clients in developing standards for Support Processes, Data Classification and Leakage, BYOD initiatives, and Incident Response.
  • Work on projects to maintain Navy Medicine Enterprise security and policies, and develop an Incident Response policy.
  • Provided 24/7 monitoring and immediate incident response, affirming a prompt and effective resolution to threats in real-time.
  • Advised both local and remote development teams in proper incident response procedures and secure development practices.
  • Produced >$2.6M in revenue through billable hours and incident response training services.
  • Provide network and host based security, incident response, firewall and VPN management.
  • Participate in organization's Threat & Vulnerability Assessment process, Incident Response Process.
  • Completed a Corporate Incident Response Program and documented the program standards.
  • Work directly with the Incident Response team.
  • Sample Activities: Worked as key SME and management of incident response for several major credit card processing organizations.
  • Develop and create a Cyber Security Incident Response Plan.
  • Web application penetration testing ( OWASP methodology) Digital forensics and incident response (DFIR)

Show More

27 Incident Response Jobs

No jobs at selected location

18. Network Security

demand arrow
average Demand
Here's how Network Security is used in Senior Security Consultant jobs:
  • Provided Intrusion Detection Analysis and other network security support to subcontractors in the Washington Metropolitan area.
  • Provided a review of information and network security architecture based on industry best practice security architectures.
  • Completed Network Security Review for Multiple Companies Conducted reviews of network design and configuration best practices.
  • Provided comprehensive documentation outlining network security related gaps and recommendations for improving information security posture.
  • Briefed the CIO, Deputy Director of Security on network security vulnerabilities and mitigation processes
  • Conducted reviews of overall Network Security Programs (and security related activities).
  • Performed product evaluations, recommended and implemented products and services for network security.
  • Completed Information and Network Security Architecture Reviews for Multiple Companies.
  • Network security, firewall management and structure.
  • Cultivate relationships to quickly and easily resolve priority issues and serve as main contact for complex network security and configuration issues.
  • Project delivery performing duties as a part of day to day support for Network Security Engineering and Operations.
  • Provide system security support to network security engineers, system administrators, network architecture, and customer's.
  • Offer design engineering Level 3 support to corporate network security and mentor Level 2 team members.
  • Provide classroom instruction for local and customer personnel on network security ArcSight ESM related topics.
  • Network security evaluations for a major retail firm and a major media firm.
  • Provided network security roadmap to assist customers with planning and implementation of recommendations.
  • Configured Cisco Pix 525 firewall with failover connection for network security and redundancy.
  • Contracted to Deepwater Horizon Claims Center to provide Network security and Server support for the 2.3 Billion dollar project.
  • Implement network security access and maintain firewalls, virtual private network (VPN, ) and load balancers.
  • Network Security Implementation Access Control Lists (ACLs).

Show More

22 Network Security Jobs

No jobs at selected location

19. ISO

demand arrow
average Demand
Here's how ISO is used in Senior Security Consultant jobs:
  • Assisted organizations with creation of their management systems and registration to international (ISO) security and service management standards.
  • Worked alongside the QA department to ensure all documents are concise and well written in order to meet ISO's standards.
  • Conduct PCI assessments as a QSA, advisory services to help organizations to obtain and maintain PCI and HIPAA compliance goals.
  • Educated the Deputy Security CISO, COO and NY State CISO on all facets of governance and regulatory requirements.
  • Utilized extensive personal business skills to aid in fulfilling the role of a liaison between business and I.T.
  • Acted as liaison for, and coordinated work between, development and test teams from both companies.
  • Set up meetings and conference calls with all appropriate Points-Of-Contact including ISO, PM, and ISSO.
  • Used FireEye to managing intrusions to proactively look for suspicious activity in real-time and isolate the threat.
  • Contracted as consulting security engineer, managed, directed SynchroPhaser project for ISO of New England.
  • Developed information security policies, procedures, and guidelines using the NIST and ISO27K frameworks.
  • Utilized analysis tools and provided event details to isolate network threat sources and targets.
  • Managed Developed risk and vulnerability assessment processes based on NIST and ISO frameworks.
  • Act as a liaison for customers by performing the PCI Defensive posture.
  • Researched requirements and made recommendations for ISO and PCI DSS compliance.
  • Performed HIPAA, SOX, OMNIBUS, PCI, and ISO27001based audits nationally.
  • Trusted advisor to companies for all security related administrative and technical controls.
  • Participated in consulting engagements for broker/dealers and investment advisors.
  • Educated the new CISO and customer's newly established security team in all security risks, policies and governance.
  • Silver Parachute is a partner company of Orange Parachute, a leading ISMS/ISO 27001 consulting services firm.
  • Served as security advisor for all foreign and local executives.

Show More

61 ISO Jobs

No jobs at selected location

20. Security Solutions

demand arrow
average Demand
Here's how Security Solutions is used in Senior Security Consultant jobs:
  • Trained new engineers in delivery of security solutions, secure network design and overall system optimization.
  • Work as consultants to internal departments, Enterprise Information Security and Service Centers for security solutions.
  • Helped clients determine project objectives and expectations, measure progress, understand and implement security solutions.
  • Set policy and strategic direction as it pertains to security solutions and infrastructure.
  • Implemented security solutions on national and international scale for multiple repeat clients.
  • Provided customer presentations of current security threats and NSN security solutions.
  • Design and implement security solutions for US government customers
  • Designed and implemented networking and security solutions.
  • Translated customer requirements from RFI/RFP(s) into security solutions and provided support for scoping and pricing those solutions.
  • Advised many customers on security solutions & focused heavily on Data Protection solutions such as DLP & DAM.
  • Provided customers with customized security solutions like SEP, SSIM, SMS, SCSP, and SAV.
  • Provide technical assistance and support to IT and business users as it pertains to security solutions.
  • Understand and implement the software certification process as it pertains to security solutions.
  • Evaluate client s needs and sell client s on electronic security solutions.
  • Worked with Customer Teams and Partners to position security solutions for customers including architecting of customized solutions
  • Implemented Cisco TrustSec 802.1x Datacenter Security Solutions. "

Show More

67 Security Solutions Jobs

No jobs at selected location

21. Governance

demand arrow
average Demand
Here's how Governance is used in Senior Security Consultant jobs:
  • Directed, planned financial and governance, management, coordinated and participated in IO collection management.
  • Designed RBAC development processes and governance model for the life cycle of roles management.
  • Oversee the creation of client governance platforms governing data-lakes and merging data warehouse distributions.
  • Oversee current security policies using governance and control system (Archer).
  • Implemented Data Governance Best Practices within the data platform covering both operational and technological solutions.

Show More

48 Governance Jobs

No jobs at selected location

22. Cyber

demand arrow
average Demand
Here's how Cyber is used in Senior Security Consultant jobs:
  • Served as a Cyber-Security and technical Subject Matter Expert for all related security investigations.
  • Recorded assessments in WizNucleus;Cyberwiz-Pro.
  • Aligned the CyberArk out of the box platforms and policies per customer's standard security policies.
  • Developed and delivered series of one-day seminars on Cyber Security Incident Response Planning for Florida Dept.
  • Engaged with all levels of personnel regarding cyber security requirements.
  • Provide a broad range of services for a multitude of critical infrastructure providers to enhance cyber security and compliance.
  • Improved security level of the Department of Agriculture related to cyber, IT, and physical security areas.
  • Led team of (9) IA professionals focused on operational cybersecurity and Enterprise Risk Management.
  • Led Disaster Recovery and Cyber Security Incident Response Exercises to maintain compliance with CIP-008 and CIP-009.
  • Research and recommend new tools and techniques for the entire cyber security team.
  • Develop and implement cyber security site procedures, policy and standards.
  • Assisted in stand-up efforts of new Army Cyber Security Directorate.
  • Developed and facilitated Integrated Security Workshop, Cyber Security Dashboard and Metrics meetings, and other related Cyber Security meetings.
  • Provide the actionable intelligence used in organizational IT Asset protection, strategic cyber threat trending & situational awareness.
  • Attended NESCOR Working Conference hosted by EPRI Working conference to help further the development of smart grid cyber security standards.
  • Led IT risk assessments, including: Vulnerability Assessments, Cyber Readiness Assessments and Incident Response planning.
  • Provided NERC CIP cyber security pre-audit assessment Basin Electric Power Cooperative, Bismarck, SD.
  • Created list of 100+ Cyber Security Metrics and vetted across MACOMs to obtain consensus.
  • Implemented cyber security and cyber threat Built deep cyber threat talent through targeted recruitment of skilled security experts and resources.
  • Authored the public IPv6 transition documents "Applications and Security Solutions Assessment" and Co-Authored the "Cyber-Security

Show More

143 Cyber Jobs

No jobs at selected location

23. Assurance

demand arrow
average Demand
Here's how Assurance is used in Senior Security Consultant jobs:
  • Provided recommendation on quality assurance management processes to ensure that all systems meet security requirements.
  • Coordinated quality assurance testing for user interfaces.
  • Appointed as the Information Assurance Manager (IAM) for largest circuit-enclave in the USAF.
  • Analyzed and determined applicable information assurance (IA) requirements for various projects.
  • Managed the department Information Assurance (IA) directorate program support team.
  • Ensured adherence with quality assurance standards by managing test plan creation.
  • Assisted Information Assurance team to achieve SLA revenue objectives.

Show More

2 Assurance Jobs

No jobs at selected location

24. Application Security

demand arrow
average Demand
Here's how Application Security is used in Senior Security Consultant jobs:
  • Developed, implemented and maintained application security processes and security testing process and methodologies for the financial and brokerage industry.
  • Provided static and dynamic application security assessments and risk mitigation recommendations.
  • Perform wireless, network, and application security assessment and evaluation.
  • Lead application security team for regression testing and vulnerability assessment.
  • Determined mobility and application security defects.
  • Provide resolutions to application security vulnerabilities.
  • Served as a primary point of contact and subject matter expert in all F5 ASM platform and application security matters.
  • Performed system, network and web application security assessments on both a non-invasive and invasive level.
  • Proposed new strategy, design, and planning to re-implement PeopleSoft HCM Row-Level application security.
  • Performed large-scale application security integration and Java development for the PwC IAM practice.
  • Introduced use of application security best practices based upon OWASP Top 10 security controls to web application development team.
  • Performed risk assessment, gap analysis and build roadmap for the application security practice.

Show More

54 Application Security Jobs

No jobs at selected location

25. Project Management

demand arrow
average Demand
Here's how Project Management is used in Senior Security Consultant jobs:
  • Developed and instituted methodologies for risk assessment, remediation activities, and project management.
  • Received a proprietary project management certification similar to PMP.
  • Project Management: - Developed a custom MS SharePoint-based project management tool set for managing project tasks and identify project risks.
  • Followed in-house methodology based on the Project Management Body of Knowledge (PMBOK).
  • Executed all aspects of project management from inception through completion.
  • Project management, customer support, and troubleshooting.
  • Project Management / Proposal Support.
  • Project management for each project included weekly updates with key stakeholders, identifying key milestones and managing deliverable timelines.
  • Project management for large, multi-disciplined assessment projects.

Show More

9 Project Management Jobs

No jobs at selected location

26. IDS

demand arrow
average Demand
Here's how IDS is used in Senior Security Consultant jobs:
  • Prepared acquisition budgets, wrote bid specifications, solicited vendor offers and evaluated vendor bids.
  • Developed and submitted labor bids from subcontractor network for union labor only required projects.
  • Performed security analysis for IDS and Firewalls.
  • Conducted daily security duties for the production environment, password resets, new IDs, and changes to current roles.
  • Implemented Secure Works Managed Security Services SIEM for IDS and IPS devices on the Edge.
  • Designed security best practices in relation to IDS, firewall security, proxy, etc.
  • Collected incident related data that acquired looking into log for firewalls, routers and IDS.
  • Implemented automated process for the creation of SAP IDs to replicate at ESRI database.
  • Create test IDs and documentation for unit testing of all end user production roles.
  • Team Lead to identify multiple SIEM solutions, ASV and IDS/IPS cloud vendor solutions.
  • Set up test IDs in Development and Quality systems for unit and integration testing.
  • Reviewed firewall, router, IDS and other network node logs.
  • Set baseline IDS configurations and performed monitoring and response to alerts.
  • Installed and set up IDS systems including NIDS and HIDS.
  • Created content roles and user ids in HANA Studio.
  • Coordinated project bid submittals, project presentation, project scope of work and project rebids with client estimators and project managers.
  • Strengthened security in areas like IDS/IPS, SIEM, Malware Protection, WAF, security awareness training, IR procedures.
  • Reviewed SIEM solutions (ArcSight and Symantec), IDSIPS solutions and provided recommendations.
  • Provided first level support for intrusion detection using Enterasys DragonSight NIDS.
  • Worked with GRC EUP to define all Firefighter IDs with owners/approvers.

Show More

27. Ips

demand arrow
average Demand
Here's how Ips is used in Senior Security Consultant jobs:
  • Experienced in managing vendor relationships, identifying best of breed technologies, and tailoring technical solutions into strategic offerings.
  • Build consensus and collaboration to strengthen vendor relationships and improve security architectures that result in security risk reductions.
  • Exhibit extensive understanding of Wireless Security to strengthen relationships with Residential and Commercial clients.
  • Created and maintained referral and lead generating relationships with subcontractors and general contractors.
  • Maintained Cisco IPS solution for a large non-profit community organization.
  • Manage relationships, mentor on and off shore junior staff, and compose business and technical documents.
  • Developed roles based on custom HR relationships, eliminating 75% of the current PA based roles.
  • Managed project resources to include Security Analysts, Network and Security Engineers and Third Party Vendor relationships.
  • Achieve strong client relationships by guaranteeing and delivering high levels of customer service.
  • Generated new client sales leads, while maintaining and growing existing client relationships.
  • Developed and maintained relationships with home and business owners to gain referrals.
  • Manage vendor relationships with key vendor partners.
  • Cultivate client relationships by providing objective, vendor-neutral advice and recommendations Accomplishment: Created the Bell Tech.logix security practice from scratch.
  • Used networking opportunities to create successful, on-going business relationships.
  • Create and populate requirements traceability matrix for Low, Moderate, and High impact systems based upon FIPS199 security categorization.
  • Managed vendor relationships with Spud Software, AlienVault, IBM and Tanium to increase client side support.
  • Implemented and documented FIPS 199 Moderate security controls Proofpoint s email archiving system cloud offering.
  • Maintained client relationships and managed CIP compliance projects for electrical entities throughout North America.
  • Secured partnerships with high profile enterprise SLED Accounts for Norse (i.e.
  • Manage existing vendor relationships with Telco providers of multiple OC3 circuits.

Show More

19 Ips Jobs

No jobs at selected location

28. Healthcare

demand arrow
average Demand
Here's how Healthcare is used in Senior Security Consultant jobs:
  • Work on privacy initiatives/projects involving international, federal, healthcare, financial, and educational privacy.
  • Provide support and consultation for SMB Healthcare organization concerning remediation of internal vulnerability analysis.
  • Initiate Business develop activities related to healthcare, International, and Financial privacy.
  • Performed a HIPPA, HITRUST, NIST assessment for a major Healthcare providers, a renowned medical University in the US.
  • Managed the security assessment and governance programs for the Catholic Healthcare West Electronic Health Records (CHW EHR) Program.
  • Support financial, healthcare, insurance, manufacturing, aerospace, military, IT storage, and records management sectors.
  • Performed consulting and project management duties for customers in the restaurant, manufacturing, healthcare, and shipping industries.
  • Provided security consultation services to several client industries like Healthcare, Media Advertising, State and Local Government Agencies.
  • Assisted a National Healthcare client in securing their ATO to support DoD contracts in a Cloud Based Environment.
  • Created overall High Availability Healthcare Platform (HAHP) Project Plan and hit EVERY milestone date on time.
  • Created network forensics and ISO 27001 ISMS plan for Northeast Healthcare System.
  • Experienced in commercial, healthcare, insurance, and legal sectors.
  • Work extensively with healthcare clients.
  • Performed IT risk and technical assessments of storage and network architecture, security assessments and data compliance for healthcare providers.
  • Conducted assessments for national and international clients in retail, healthcare,petroleum, and financial services industries.

Show More

29. Security Personnel

demand arrow
average Demand

30. Data Privacy

demand arrow
low Demand
Here's how Data Privacy is used in Senior Security Consultant jobs:
  • Assisted clients with data privacy and masking to meetregulatory demands.

Show More

9 Data Privacy Jobs

No jobs at selected location

31. VPN

demand arrow
low Demand
Here's how VPN is used in Senior Security Consultant jobs:
  • Lead Engineer for major corporate LAN/WAN hardware upgrade to Cisco/F5 Big IP LTM v7.x and Juniper firewall VPN solutions.
  • Deployed and configured Juniper SRX, integrated Juniper SA series SSL-VPN for AAA and encrypted VPN access.
  • Managed several DIACAP related network projects to include the implementation of CISCO, CoPP and GetVPN Protocols.
  • Provided VPN connectivity consistent with the CMS HIGLAS Virtual Desktop Technology (VDT) Security requirements.
  • Authored VPN policy for NYSE remote access for employees and member firms.
  • Configured VPN tunnel on Cisco Pix 535, using 3DES encryption.
  • Design and development of full mesh hardware VPN solution.
  • Implemented Cisco SSL VPN solution with CA AuthMinder.
  • Lead Stanford's VPN Lab outreach program.
  • Lead pre-sales consultant for Defender (token-based authentication), PowerVPN and PC encryption products.
  • Recompiled the OpenVPN code and translated the installer into a Western Asia foreign language.
  • Developed a 3-day security course that integrated Defender, PowerVPN and PCShield.
  • Deployed several ASA SSL-VPN setups within the L.A. and surrounding Southern California areas. "
  • Implemented several Juniper 6500 SSLVPN appliances for global organizations. "

Show More

32. GRC

demand arrow
low Demand
Here's how GRC is used in Senior Security Consultant jobs:
  • Work with business managers in changing SAP roles and ensuring appropriate work flow in GRC Compliant User Provisioning.
  • Project Management for incorporating and teaching engineers use of GRC tool into NEI compliance process at Southern Company.
  • Assisted client with configuration, testing, documentation, training and support for GRC AC EAM and ARA.
  • Worked with SAP GRC RAR to produce Role Definition and change history reports for Internal/External Auditors.
  • Used GRC tool to identify with SOD conflicts, SAP assessment and remediation.
  • Provided support and perform functional testing during GRC upgrade from 5.3 to 10.0.
  • Used SAP GRC 5.2 extensively for handling SOD conflicts for each user.
  • Reviewed future requirements for additional GRC AC, PC and RM tools.
  • Project: SAP Security Support Environment:ECC.6.0/BI/Sap GRC 53.
  • Worked on implementation of GRC 5.3 compliance Management tool.
  • Recommended and created mitigation controls in SAP GRC.
  • Contributed to Oracle GRC & IDM implementations.
  • Updated Functions, Risks, Rules, Rule Matrix in GRC.
  • End to End Testing of all Scenarios in GRC AC.
  • Used SAP GRC AC 5.2 for user provisioning.
  • Designed exit strategy security document encompassed proposal for GRC 10.0 Presented to management weekly with updates.
  • SAP GRC PC 2.5 team responsible for implementing in pre-deployment environment the initial test bed for future customer deployments.
  • Utilize eGRC (also known as Archer) to manage assessment and remediation records
  • Type: Virsa 4.0 to GRC 10.1 Migration, Implementation & Support.
  • Involved in Pre and Post Installation activities of GRC AC 10.1.

Show More

33. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Senior Security Consultant jobs:
  • Developed firewall security policy for and participated in Checkpoint firewall management for the enterprise.
  • Designed and implemented service-oriented architectures (SOA), reviewing Checkpoint solutions.
  • Worked on Nokia IPSO firewall appliances, utilizing Checkpoint FW-1 NG, NGX, and the entire line of Nokia mobile devices
  • Assisted with Checkpoint R75 implementation.
  • Upgrade multiple Checkpoint firewalls (Gateways and SmartCenters) R65 to R75.40 (Gaia/SPLAT/Nokia Appliances).
  • Assisted in preparation for NERC CIP audit, reviewed Checkpoint R75 ruleset.

Show More

34. Intrusion Detection

demand arrow
low Demand
Here's how Intrusion Detection is used in Senior Security Consultant jobs:
  • Implement and monitor intrusion detection on multiple network domain to ensure security policies are enforced to meet cooperate standard.
  • Assisted in the installation and tuning of both Cisco and Real-Secure intrusion detection systems.
  • Deployed corporate Intrusion Detection and Prevention systems for all corporate and E-Commerce DMZ environments.
  • Project Manager for security installations at Alliant Energy (CCTV, access control devices, intrusion detection) and facility projects.

Show More

1 Intrusion Detection Jobs

No jobs at selected location

35. Security Issues

demand arrow
low Demand
Here's how Security Issues is used in Senior Security Consultant jobs:
  • Assess customer information systems for security issues and provide guidance with risk prioritization.
  • Handled successfully without escalations and provided on time support to security issues.
  • Updated senior management on critical security issues and advised on mitigating controls.
  • Helped customers find appropriate technical and non-technical solutions to address security issues.
  • Consulted on internal and external security issues in the hospitality, retail, and gaming industry.
  • Played a key role in assisting with building security issues and security hardware problems.
  • Managed to troubleshoot department security issues by schedule to run SJT processes.
  • Analyzed client's security issues on the CMS Medicare contract.
  • Worked closely with Y2K team related to Y2K Security issues.
  • Supported PLM and SRM security issues after interface.
  • Advise customers of relevant security issues and solutions.
  • Lead support for Websense email and web applications content filtering, security issues, upgrades, and maintenance.
  • Trouble shooting support for the users authorization failures and resolving Security issues.

Show More

29 Security Issues Jobs

No jobs at selected location

36. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Senior Security Consultant jobs:
  • Configured and managed provisioning to multiple domains in Active Directory.
  • Provided Active Directory technical expertise for application and business teams.
  • Showcased the Benefits of Active Directory, including its ability to lower the total cost of ownership.
  • Worked on administering of User accounts, Group memberships, and Organizational Units using Active Directory.
  • Installed Windows-NT/2000 Servers, configured network and implementing ADS (Active Directory Service).
  • Managed Global change to Active Directory through Change Management and ITIL framework.
  • Used Active Directory to manage the authorization for user permissions and credentials.
  • Completed a consolidation of 5 NT domains into a single Active Directory environment Migrated 5,000 mailboxes from Exchange 5.5 to Exchange 2003
  • Managed user provisioning to Active Directory, LDAP Designed scheduled tasks for user reconciliation and clean-up processes.
  • Lead the Active Directory/PeopleSoft consolidation workflow by 1-to1 matching 400,000 PPLSoft accounts to 100,000 AD accounts.

Show More

16 Active Directory Jobs

No jobs at selected location

37. Siem

demand arrow
low Demand
Here's how Siem is used in Senior Security Consultant jobs:
  • Provided a centralized repository of evidence artifacts by employing SIEM.
  • Review existing use cases to analyze gaps, and propose new use cases to be implemented into ArcSight and other SIEM solutions
  • Managed a large scale SIEM project for an international banking organization.
  • Tasked with the configuration of Envision SIEM to ensure PCI compliance.
  • Performed remote / virtual design work for Siemens Enterprise Global using Enterasys Networks equipment solely for the solutions.
  • Used Splunk to perform SIEM Intrusion Detection and read logs and write Windows scripts and alerts.
  • Worked with data loss prevention tools, web browsing filters, email filters, vulnerability scans, SIEMs, and IPSs.
  • Provide Pre-Sales support via Webex and face to face presentations for Enterprise SIEM-QRadar opportunities in the West Region.

Show More

66 Siem Jobs

No jobs at selected location

38. Security Systems

demand arrow
low Demand
Here's how Security Systems is used in Senior Security Consultant jobs:
  • Designed over 100 security systems and managed the implementation.
  • Consult & sell home/business security systems.
  • Designed, sold and managed commercial integrated security systems in Utah, Wyoming, Montana and Idaho.
  • Design and sales of residential and commercial security systems for regional ADT dealership.
  • Managed security systems and services for two major inter-state bank accounts in Houston.
  • Evaluated the selection of Managed Security Services for key IT security systems.
  • Customized and sold security systems and monitoring services over the phone.
  • Work directly with prospects looking to buy home security systems.

Show More

39. Access Management

demand arrow
low Demand
Here's how Access Management is used in Senior Security Consultant jobs:
  • Implemented Identity and Access Management project, provisioning and delegated administration, directory services, meta- and virtual directory.
  • Performed high availability analysis, capacity planning and disaster recovery plans for the access management infrastructure.
  • Designed and implemented security architecture using identity management, access management and RBAC tools.
  • Developed Federated Identity consolidation and access management SSO architecture framework for MTA applications.
  • Design and implementation of Federated Identity Access Management System.
  • Worked on Identity and Access Management assessment/readiness framework.
  • Led a strategy and roadmap initiative to identify and prioritize user access management initiatives for a global airline.

Show More

64 Access Management Jobs

No jobs at selected location

40. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Senior Security Consultant jobs:
  • Produce gap analysis to identify alternate solutions specific to SAP security requirements and provide technical recommendations on design and architecture improvements.
  • Determined appropriate business and security requirements using governing laws and stakeholder interviews for software development and process-re-engineering projects.
  • Evaluated security requirements and created FW policies based corporate requirements to include overall design and initial installation.
  • Provided guidance on the implementation of numerous security technologies and assisted clients with System Security Requirements.
  • Determine information security requirements based on business risk, regulatory compliance and security best practices.
  • Modify existing and create new corporate security policies covering IT and business security requirements.
  • Worked with management to define perimeter security requirements to comply with VITA standards.
  • Created strategy documents for non-production and production system security requirements.
  • Coordinated with global sales force and PM's to ensure all regional security requirements were met.
  • Updated IBM Methodology with security requirements and security patterns for all IBM use.
  • Assessed several Wells Fargo data centers for compliance with ISO27k physical security requirements.
  • Provided security expertise and guidance regarding offeror s ability to meet the security requirements of the ETS2 solicitation.
  • Architect/Defined, Implemented and Documented global Security Requirements Experienced working on a global SAP, BW security assignment.
  • Ensured compliance of equipment and applications with DoD information system security requirements, DISA STIGs and DCID 6/3.

Show More

11 Security Requirements Jobs

No jobs at selected location

41. Internet

demand arrow
low Demand
Here's how Internet is used in Senior Security Consultant jobs:
  • Network vulnerability assessment of the Internet infrastructure of a Fortune 100 electronics retailer.
  • Support the design, development and maintenance of applications that leverage internet and intranet technology in support of key business strategies.
  • Developed network designs including Frame Relay, ATM, Redundant Internet Access, and SONET Rings and developed implementation plans.
  • Performed penetration and vulnerability testing using ISS Internet Scanner, CoreImpact, NMAP and open source information for various customers.
  • Worked on BGP configuration for providing redundant internet connectivity using BGP attributes, Route maps, prefix-lists etc.
  • Provided consulting services in Optical Networking, Wireless Networking, Router, Firewall and Internet Appliance configuration.
  • Re-Engineered Internet Firewall and DMZ Network Security Infrastructure with add-on deployment of ISA 2006 Reverse Proxy Firewall.
  • Planned, trained other researchers on Information Warfare and Internet services.
  • Provide technical support for clients with dial-up internet issues.
  • Developed firewall systems for Internet / Extranet /Intranet security.
  • Multi-homed Internet connections with and without BGP-4 high availability.
  • Implement company policy of firewalling all external connections: Internet, Market Data, WAN, vendor, and eCommerce.

Show More

42. RSA

demand arrow
low Demand
Here's how RSA is used in Senior Security Consultant jobs:
  • Verified satisfaction with delivered services through surveys and direct conversations.
  • Tasked with performing security log analysis utilizing RSA Envision.
  • Project Lead/Implementer for RSA SecurID two-factor authentication for several banking industries within the Southern California and L.A. areas.
  • Register controls deficiencies, track remediation activities and maintain appropriate ownership assignments in RSA Archer application tool.
  • Manage customer security event data using MARS, RSA Envision, OSSIM and other tools.
  • Configured encryption solutions from RSA and PGP for file and disk encryption.
  • Have good experience VIRSA Fire-Fighter.
  • Used BW t codes like RSECADMIN, RSA1, and RSD1 etc.
  • Served as Architect and Lead Consultant for multinational RSA enVision implementation project
  • Coordinated with Controls Team with Virsa implementation to develop workbooks.
  • Integrated RSA ACE server and SecurID into Citrix remote-access environment for a NY financial services firm.
  • Used Virsa tool extensively for handling SOD conflicts for each user.
  • Performed training on Virsa tools for internal auditors.
  • Installed and supported RSA SecurID rollouts.
  • Assigned roles using Virsa RE.
  • Participated in vendor evaluation for Virsa/Apporva tool selection; made technical recommendations.
  • Presented by RSA CAM to RSA internal as one of the best RSA SAs & SEs in the Tristate area.

Show More

43. Security Products

demand arrow
low Demand
Here's how Security Products is used in Senior Security Consultant jobs:
  • Develop the organization's security posture delivering security products and services to customer base.
  • Demonstrate and design residential and commercial security products and services.
  • Researched new technologies, security products suggested architecture designs.
  • Recommend and implement security products and solutions for customers.
  • Aligned marketing plans with product releases, resulting in 90% upgrade or new purchases for data and security products.
  • Worked with development, many other internal and external groups to deploy and install Security products enterprise wide.
  • Designed, installed, configured core Systems Management products as well as security products.
  • Provided Integration of a Wide Variety of Information Security Products for Multiple Companies.
  • Evaluate security products and work with various vendors in evaluating the product.
  • Provide guidance and training to clients on security products and software.
  • Design and Deploy Kaspersky Security products at customer site.

Show More

44. Fisma

demand arrow
low Demand
Here's how Fisma is used in Senior Security Consultant jobs:
  • Led development and maintenance of security tools used by IA Directorate to support implementation of and compliance with FISMA including:.
  • Leveraged key regulatory guidance such as FISMA, FISCAM and OMB A123 and OMB A-130.
  • Measure compliance with the Federal Information Security Management Act of 2002 (FISMA).
  • Conducted FISMA Gap Assessment and Asset Management Surveys for commercial customers.
  • Referenced NIST/IAM/FISMA/FedRAMP/ISO and ITU National Cyber Security Strategy Framework.

Show More

3 Fisma Jobs

No jobs at selected location

45. Data Loss

demand arrow
low Demand
Here's how Data Loss is used in Senior Security Consultant jobs:
  • Planned and conducted data loss prevention IT security audit on a multinational organization in the recruitment industry.
  • Deploy and Manage Data Loss Prevention and Security configuration analysis for various operating systems.
  • Execute IT Security Audit with emphasis on Data Loss Prevention (DLP).
  • Assisted peers in development of DLP (Data Loss Prevention) methodology.

Show More

46. Cctv

demand arrow
low Demand
Here's how Cctv is used in Senior Security Consultant jobs:
  • Specialized in personally engineering and designing commercial and residential security systems including CCTV camera systems.
  • Designed and sold residential and commercial security and CCTV systems.

Show More

47. Linux

demand arrow
low Demand
Here's how Linux is used in Senior Security Consultant jobs:
  • Implemented customized Linux Kernel for enhanced Security and performance of proxy servers.
  • Manage and provide support to analyze Windows/Linux logs(Log Watch), network/host based syslog logs etc.

Show More

48. Risk Analysis

demand arrow
low Demand
Here's how Risk Analysis is used in Senior Security Consultant jobs:
  • Risk analysis and alignment and/or realignment of internal security controls.
  • Managed and delivered network penetration testing services, technology consulting, and risk analysis to clients in the U.S.
  • Performed detailed risk analysis and worked with KPMG auditors on networks at large sites in London and Amsterdam.
  • Stabilized change execution, inclusive of risk analysis and planning, with a 100% success.
  • Assist in the documentation of assessment response, controls validation, and risk analysis outcomes.
  • Performed the risk analysis user level, role level.
  • Performed risk analysis at user and role level.
  • Run Risk Analysis at User / Role Level.
  • Configured /Maintain configuration parameters for Access control workflow, Risk analysis and Emergency user access, Role management.
  • Configured ruleset and scheduled background jobs for Access risk analysis.

Show More

49. Unix

demand arrow
low Demand
Here's how Unix is used in Senior Security Consultant jobs:
  • Design and implementation of a high-availability Unix-based email system including an OpenLDAP authentication layer also serving dial-up and DSL-based accounts.
  • Created Database Threshold queries for LAN encompassed in a heterogeneous environment of UNIX, NT, and Windows.
  • Develop framework for implementation of controls on Windows and UNIX based intermediate systems.
  • Experience with Windows and Unix operating systems and performing deep packet network analysis.
  • Performed development on both windows and UNIXenvironment.
  • Integrated systems including Windows, Unix, IIS, MSSQLand moreinto the log monitoring system.

Show More

50. Solaris

demand arrow
low Demand
Here's how Solaris is used in Senior Security Consultant jobs:
  • Performed Vulnerability research and analysis on Solaris operating system and components.
  • Tested and Developed configurations on Solaris 2.6/7/8, Windows 9x, NT/2000, HPUX, and AIX operating systems.
  • Assisted in modifying Solaris CIS Benchmarks to organization specific policies in order to create secure.
  • Implemented firewalls on Windows NT/2000 and Solaris platforms.
  • Administered Solaris, AIX, and HPUX hosts.
  • Installed Linux, Solaris on X86 machines.

Show More

Senior Security Consultant Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Security Consultant

Ensure Compliance

11.9%

Vulnerability Assessments

8.3%

Infrastructure

7.8%

Firewall

7.5%

Security Policies

6.8%

Information Security

6.5%

Security Audits

6.1%

Security Consultant

5.0%

PCI DSS

5.0%

Access Control

3.8%

SOX

3.6%

Nist

3.5%

Hipaa

3.5%

Risk Management

3.3%

Security Assessment

3.3%

Risk Assessments

3.1%

Incident Response

3.0%

Network Security

2.7%

ISO

2.6%

Security Solutions

2.6%
Show More

Typical Skill-Sets Required For A Senior Security Consultant

Rank Skill
1 Ensure Compliance 7.7%
2 Vulnerability Assessments 5.4%
3 Infrastructure 5.1%
4 Firewall 4.9%
5 Security Policies 4.4%
6 Information Security 4.2%
7 Security Audits 3.9%
8 Security Consultant 3.3%
9 PCI DSS 3.2%
10 Access Control 2.5%
11 SOX 2.3%
12 Nist 2.3%
13 Hipaa 2.3%
14 Risk Management 2.1%
15 Security Assessment 2.1%
16 Risk Assessments 2.0%
17 Incident Response 1.9%
18 Network Security 1.7%
19 ISO 1.7%
20 Security Solutions 1.7%
21 Governance 1.7%
22 Cyber 1.5%
23 Assurance 1.4%
24 Application Security 1.4%
25 Project Management 1.4%
26 IDS 1.4%
27 Ips 1.4%
28 Healthcare 1.3%
29 Security Personnel 1.3%
30 Data Privacy 1.2%
31 VPN 1.2%
32 GRC 1.2%
33 Checkpoint 1.2%
34 Intrusion Detection 1.2%
35 Security Issues 1.2%
36 Active Directory 1.2%
37 Siem 1.2%
38 Security Systems 1.2%
39 Access Management 1.1%
40 Security Requirements 1.1%
41 Internet 1.1%
42 RSA 1.0%
43 Security Products 1.0%
44 Fisma 1.0%
45 Data Loss 0.9%
46 Cctv 0.9%
47 Linux 0.9%
48 Risk Analysis 0.9%
49 Unix 0.9%
50 Solaris 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

17,059 Senior Security Consultant Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.