Your Journey at Crowe Starts Here:At Crowe, you have the opportunity to deliver innovative solutions to today’s complex business issues.
Crowe’s accounting, consulting, and technology personnel are widely recognized for their in-depth expertise and understanding of sophisticated process frameworks and enabling technologies, along with their commitment to delivering measurable results that help clients build business value.
Our focus on emerging technology solutions along with our commitment to internal career growth and exceptional client value has resulted in a firm that is routinely recognized as a “Best Place to Work.” We are 75 years strong and still growing.
Come grow with us!Job Description:By joining Crowe’s Digital Security team, you will be helping make the world a more honest, safe and secure place.
As a member of our collaborative team, you will be working alongside experts in the security field to protect our clients from threats and vulnerabilities and assist them with their complex security needs.
We will enable an entrepreneurial and innovative environment for you to deliver transformative security consulting services and to develop deeply specialized skill sets demanded in today’s market.The Digital Security Consultant will be responsible for providing their experience to help execute cybersecurity projects and deliver high quality work to our clients.
This position will work directly with project leads, managers, and/or executives to communicate business and technical aspects of the work being performed.
This person may also assist the engagement economics of the projects, including budget status tracking.The Digital Security Consultant will conduct Cybersecurity engagements, including but not limited to the following areas and responsibilities:
– Information Security and Risk Management Consulting
– IT Risk Assessment
– Cybersecurity Assessments
– Penetration Testing
– Choose based on industry: FFIEC Cybersecurity Assessments, HIPAA Assessments, etc.
– Cloud Security Reviews
– IT Security Technology Implementations
– Prepare reports or other necessary documentation to detail results of evaluation and otherwise meet the objectives of the Project.
– Submit recommendations to client for corrective action or to support a recommend approach to solving the client’s needs.
– Participate in planning and implementing of client information systems, including structure, process, and security.
– Participate in strategic and tactical objectives to include new product offerings, identify additional client needs, and generating new business leads.
– Correspond with a variety of clients and communicate security issues, recommendations, and deliverables effectively.
– Evaluate and/or implement cybersecurity solutions and controls to ensure data security and integrity for our clients.
– Generate ideas for new cybersecurity solutions aligned with our clients evolving needsQualifications:
– Bachelor’s degree required, candidates must possess significant analytical skills, which likely evolved from early academic training in Cybersecurity, Information Systems, Computer Science, or similar discipline.
– Minimum 1-3 years of business experience in the areas of Information Security.
– Pentesting experience is preferred
– Certified Information Systems Security Professionals (CISSP) or OSCP certification, or willingness to obtain
– Experience within consulting or professional services, or at leading industry public companies is preferred.
– Prior experience supervising junior level resources in the areas of Information Security.
– Knowledge of internetworking technology.
– System and network administration experience on UNIX, Linux, and Microsoft Windows.
– Knowledge of security areas such as Auditing, Policy, Database Security, Firewall Design and Implementation, Risk Analysis, Identity Management, Access Management, or Web Services is very desirable.
– Strong writing and interpersonal communication skills.
– The ability to handle multiple projects concurrently
– Ability to travel up to 60%Technology Skills preferred:
– Network Security Practices: Auditing, planning, design, implementation, testing, and management
– Microsoft Windows, Red Hat Linux, IBM AIX, and other UNIX/Linux variants
– Microsoft Active Directory and Group Policy
– Network architecture and protocols: TCP, UPD, IP, HTTP(S), DNS, NetBIOS, SMB, SSH, IPSec, EIGRP, OSPF, BGP, TLS, and others
– Microsoft SQL Server, Oracle, IBM DB2, and others
– Penetration Testing tools : Burp, Nmap, Metasploit, Empire, Cobalt Strike, and others
– Intrusion Detection, Intrusion Prevention, Security Information and Event Management solutions
– Cryptographic tools, suites, and algorithmsOur Benefits:At Crowe, we know that great peopleare what makes a great firm.
We value our people and offer employees a comprehensive benefits package.
Learn more about what working at Crowe can mean for you!How You Can Grow:We will nurture your talent in an inclusive culture that values diversity.
You will have the chance to meet on a consistent basis with your Career Coach that will guide you in your career goals and aspirations.
Learn more about where talent can prosper!More about Crowe:Crowe (www.crowe.com) is one of the largest public accounting, consulting and technology firms in the United States.
Crowe uses its deep industry expertise to provide audit services to public and private entities while also helping clients reach their goals with tax, advisory, risk and performance services.
Crowe is recognized by many organizations as one of the country’s best places to work.
Crowe serves clients worldwide as an independent member of Crowe Global, one of the largest global accounting networks in the world.
The network consists of more than 200 independent accounting and advisory services firms in more than 130 countries around the world.Crowe LLP provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
The post FS Digital Security Consulting Consultant first appeared on Trabajos 4 You.
from
https://trabajos4younyc.com/upper-management/fs-digital-security-consulting-consultant-ff5142/
from
https://trabajos4younyc.weebly.com/blog/fs-digital-security-consulting-consultant
No comments:
Post a Comment