General Cyber Security Consultant
Consultant, Senior Consultant, Principal, Senior Principal
You want to boost your career and collaborate with expert, talented colleagues to solve and deliver against our clients' most important challenges? We are growing and are looking for people to join our team. You'll be part of an entrepreneurial, high-growth environment of 300,000 employees. Our dynamic organization allows you to work across functional business pillars, contributing your ideas, experiences, diverse thinking, and a strong mindset. Are you ready?
About your role As our Cyber Security Consultant, you should have worked in one or more domains of Cybersecurity – Identity and access management, Endpoint Security, Network Security, Security Architecture, Security Operations, Risk Management and Compliance, Security Assessment and Testing, Software Development Security, etc. You keep up to date with the latest security trends, threats, best practices, and technology developments. You have sound knowledge of architecture, design, and deployment of security systems.
In this role, you should be able to identify security gaps and implement necessary measures (e.g., Firewall, EDR, IPS, IDS, SIEM, IAM, PAM, SSO, MFA, etc). You should be able to monitor and respond to common Cybersecurity threats such as Phishing, Pharming, Malware, Ransomware, etc.
Requirements Have a broad business skill set including stakeholder management, problem-solving, and resilience.
Have experience in gathering, validating, synthesizing, documenting, and communicating data and information for a range of audiences.
Have excellent interpersonal skills and strong written and verbal communication skills in the country's official language(s) (C2 proficiency) and English (C2 proficiency), project-related mobility/willingness to travel.
Possess knowledge on Identity and Access management system, joiner mover leaver process, authentication and authorization, workflows and approvals, RBAC, SOD, session management, password management and self-service, recertification and delegation, reporting and compliance, privileged access.
Must Have: Generate incident reports for both technical and non-technical staff.
Handle incident and problem management activities, investigate security incidents/alerts, provide response using incident handling methodologies and best practices, and document lessons learned scenarios.
Drive audit and assessment exercise and maintain risk register for both internal and external audits.
Use advanced analytical tools to identify threat patterns and vulnerabilities.
Perform penetration testing and ethical hacking simulating security breaches.
Participate in BCP/DR activities.
Promote a culture of security among colleagues and other stakeholders and encourage security-conscious behavior among all colleagues.
Review and improve security processes for identified gaps.
#J-18808-Ljbffr