Responsibilities :
- Worksin partnership with clients advising them on information technologyand cybersecurity practices in order to meet their businessobjectives or overcome problems work to improve structure andefficiency of an organizations I&ITsystems.
- TheI&IT Consultant may be used to provide strategic guidanceto organizations with regard to Information Management & ITtechnology CyberSecurity practices and safeguards ITinfrastructures and the enablement of major business processesthrough enhancements toIT.
- Providessubject matter expertise in their field and highly expert technicalassistance.
GeneralSkills :
- Actsas the technical advisor / expert on all aspects of a specificdeliverable
- Providethe quality assurance / quality control of specificdeliverables
- Anticipatesand resolves problems to ensure that the deliverables are completedwithin budget to the highest quality meeting or exceedingexpectations
- Developsprocesses and procedures for implementingdeliverables
- Preparesreports and presentations including options recommendationsimplementation plansetc.
- Workswith clients to define the scope of a project and to determinerequirements
- Definessoftware hardware and networkrequirements
- AnalyzesI&IT and security requirements giving independent andobjective advice on the use ofI&IT
- Designstests installs and monitors new systems and develops solutions andimplementation of newsystems
- Familiarwith changemanagement principles andmethodology
- Knowledgeand understanding ofInformation
- Managementprinciples concepts policies andpractices
Requirements
Experienceand Skill SetRequirements :
MustHaves :
- Experiencein planning organizing and implementing security related effortsfor largesystems
- Knowledgeof CyberSecurity principles including threat modeling riskassessment and security controls and Familiarity with commonsecurity Experience in Application security and network securityand theirsafeguards
- Knowledgeof risk management practices and strategies to mitigate identifiedrisks. This includes ability to assess risks related to sensitivedata
- Experiencein Security Architecture and design. This includes designing securesystems and network considering factors like access controlsencryption and secure communicationchannels
- Familiaritywith Privacy laws and understanding of privacyregulations
- Proficientin Endpoint Network and Cloud related aspects in data leakageprevention
- Experiencein understanding data flows both inside and outside theorganization
- Experiencein facilitating meetings with variousstakeholders
Skill SetRequirements :
- Proficiencyin cybersecurityrelated practices including knowledge of safeguardsis preferred. Prior experience in this area would be advantageous.
- Experiencein planning organizing and implementing security related effortsfor largesystems
- Knowledgeof CyberSecurity principles including threat modeling riskassessment and security controls and Familiarity with commonsecurity frameworks such as NIST Cybersecurity Framework ISO 27001or CISControls.
- Experiencein Application security and network security and theirsafeguards
- Knowledgeof risk management practices and strategies to mitigate identifiedrisks. This includes ability to assess risks related to sensitivedata
- Experiencein Security Architecture and design. This includes designing securesystems and network considering factors like access controlsencryption and secure communicationchannels
- Familiaritywith Privacy laws and understanding of privacyregulations
- Experiencecreating security strategy documentation plans and test scenariosfor various types and phases of securitytesting
- Proficientin Endpoint Network and Cloud related aspects in data leakageprevention
- Experiencein understanding data flows both inside and outside theorganization
- Experiencein facilitating meetings with variousstakeholders
- Experiencein leading initiatives involving stakeholders across multipleorganizations
- Experiencecreating reports and documentation and presenting to variousstakeholders seekingapproval
- Experienceleading a team of security staff and vendors working closely withthe projectleads
- Knowledgeand experience in the use of securityrelated tools andframeworks
- Experienceworking in an agileenvironment
- Knowledgeof cloud nativeapplications
Musthaves :
- Experiencein planning organizing and implementing security related effortsfor largesystems
- Knowledgeof CyberSecurity principles including threat modeling riskassessment and security controls and Familiarity with commonsecurity Experience in Application security and network securityand theirsafeguards
- Knowledgeof risk management practices and strategies to mitigate identifiedrisks. This includes ability to assess risks related to sensitivedata
- Experiencein Security Architecture and design. This includes designing securesystems and network considering factors like access controlsencryption and secure communicationchannels
- Familiaritywith Privacy laws and understanding of privacyregulations
- Proficientin Endpoint Network and Cloud related aspects in data leakageprevention
- Experiencein understanding data flows both inside and outside theorganization
- Experiencein facilitating meetings with variousstakeholders
- Experiencein planning organizing and implementing security related effortsfor largesystems
- Knowledgeof CyberSecurity principles including threat modeling riskassessment and security controls and Familiarity with commonsecurity Experience in Application security and network securityand theirsafeguards
- Knowledgeof risk management practices and strategies to mitigate identifiedrisks. This includes ability to assess risks related to sensitivedata
- Experiencein Security Architecture and design. This includes designing securesystems and network considering factors like access controlsencryption and secure communicationchannels
- Knowledgeand experience in the use of securityrelated tools andframeworks
- Experiencein leading initiatives involving stakeholders across multipleorganizations
- Familiaritywith Privacy laws and understanding of privacyregulations
- Proficientin Endpoint Network and Cloud related aspects in data leakageprevention
- Experiencein understanding data flows both inside and outside theorganization
- Experiencecreating security strategy documentation plans and test scenariosfor various types and phases of securitytesting
- Experiencein facilitating meetings with variousstakeholders
- Experiencecreating reports and documentation and presenting to variousstakeholders seekingapproval
- Experienceleading a team of security staff and vendors working closely withthe projectleads
- Knowledgeand experience in the use of securityrelated tools andframeworks
- Experienceworking in an agileenvironment
- Knowledgeof cloud nativeapplications
- Understandthe security landscape of vulnerablesectors
- Experiencein vendor management while balancing organization needs with vendorinterests
Experience and Skill Set Requirements : Must Haves : Experience inplanning, organizing and implementing security related efforts forlarge systems Knowledge of Cyber-Security principles, includingthreat modeling, risk assessment, and security controls andFamiliarity with common security Experience in Application securityand network security and their safeguards Knowledge of riskmanagement practices and strategies to mitigate identified risks.
This includes ability to assess risks related to sensitive dataExperience in Security Architecture and design. This includesdesigning secure systems and network considering factors likeaccess controls, encryption, and secure communication channelsFamiliarity with Privacy laws and understanding of privacyregulations Proficient in Endpoint, Network and Cloud relatedaspects in data leakage prevention Experience in understanding dataflows both inside and outside the organization Experience infacilitating meetings with various stakeholders Skill SetRequirements : Proficiency in cyber-security-related practices,including knowledge of safeguards, is preferred.
Prior experiencein this area would be advantageous. Experience in planning,organizing and implementing security related efforts for largesystems Knowledge of Cyber-Security principles, including threatmodeling, risk assessment, and security controls and Familiaritywith common security frameworks such as NIST CybersecurityFramework, ISO 27001, or CIS Controls.
Experience in Applicationsecurity and network security and their safeguards Knowledge ofrisk management practices and strategies to mitigate identifiedrisks.
This includes ability to assess risks related to sensitivedata Experience in Security Architecture and design. This includesdesigning secure systems and network considering factors likeaccess controls, encryption, and secure communication channelsFamiliarity with Privacy laws and understanding of privacyregulations Experience creating security strategy documentation,plans and test scenarios for various types and phases of securitytesting Proficient in Endpoint, Network and Cloud related aspectsin data leakage prevention Experience in understanding data flowsboth inside and outside the organization Experience in facilitatingmeetings with various stakeholders Experience in leadinginitiatives involving stakeholders across multiple organizationsExperience creating reports and documentation and presenting tovarious stakeholders seeking approval Experience leading a team ofsecurity staff and vendors, working closely with the project leadsKnowledge and experience in the use of security-related tools andframeworks Experience working in an agile environment Knowledge ofcloud native applications Must-haves : Experience in planning,organizing and implementing security related efforts for largesystems Knowledge of Cyber-Security principles, including threatmodeling, risk assessment, and security controls and Familiaritywith common security Experience in Application security and networksecurity and their safeguards Knowledge of risk managementpractices and strategies to mitigate identified risks.
Thisincludes ability to assess risks related to sensitive dataExperience in Security Architecture and design. This includesdesigning secure systems and network considering factors likeaccess controls, encryption, and secure communication channelsFamiliarity with Privacy laws and understanding of privacyregulations Proficient in Endpoint, Network and Cloud relatedaspects in data leakage prevention Experience in understanding dataflows both inside and outside the organization Experience infacilitating meetings with various stakeholders Experience inplanning, organizing and implementing security related efforts forlarge systems Knowledge of Cyber-Security principles, includingthreat modeling, risk assessment, and security controls andFamiliarity with common security Experience in Application securityand network security and their safeguards Knowledge of riskmanagement practices and strategies to mitigate identified risks.
This includes ability to assess risks related to sensitive dataExperience in Security Architecture and design. This includesdesigning secure systems and network considering factors likeaccess controls, encryption, and secure communication channelsKnowledge and experience in the use of security-related tools andframeworks Experience in leading initiatives involving stakeholdersacross multiple organizations Familiarity with Privacy laws andunderstanding of privacy regulations Proficient in Endpoint,Network and Cloud related aspects in data leakage preventionExperience in understanding data flows both inside and outside theorganization Experience creating security strategy documentation,plans and test scenarios for various types and phases of securitytesting Experience in facilitating meetings with variousstakeholders Experience creating reports and documentation andpresenting to various stakeholders seeking approval Experienceleading a team of security staff and vendors, working closely withthe project leads Knowledge and experience in the use ofsecurity-related tools and frameworks Experience working in anagile environment Knowledge of cloud native applications Understandthe security landscape of vulnerable sectors Experience in vendormanagement while balancing organization needs with vendorinterests