Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: InfoSec Jobs - Cyber Security Manager Flexible GSEC, GMON, GCDA, GDAT, GPEN, GCIH, GXPN, GSTRT, GWEB InfoSec Jobs


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Cyber Security Manager
Company Deloitte
Location Flexible
Preferred GIAC Certifications GSEC, GMON, GCDA, GDAT, GPEN, GCIH, GXPN, GSTRT, GWEB
Travel 50%
Salary Not provided
URL https://jobs2.deloitte.com/us/en/job/DELOA003X309541/Cyber-Security-Business-Manager-Cyber-Security-Business-Senior-Specialist
Contact Name Anonymous
Contact Email rockmonkey4004/at/yahoo.com
Expires 2019-07-09

Job Description

Cyber Security Business Manager / Cyber Security Business Senior Specialists role works in the Deloitte Function Specific Subsidiaries (FSS) Chief Information Security Officer organization directly supporting Deloitte’s Risk & Financial Advisory (RFA) and Tax FSS businesses. The role involves close integration with various FSS client-service leaders, technical and non-technical stakeholders to drive widespread cyber security program adoption. The position will drive the execution and enhancement of cyber security throughout information systems solutions in both on-premise and cloud hosted environments.

This fast-paced multi-faceted environment requires a highly motivated, self-driven, strong team leader who demonstrates an intrinsic desire for continuous personal and professional growth.

The role is responsible for elevating the overall security posture of FSS owned applications by driving security through industry best practices in software design, architecture, and compliance. Additionally, accountable for ensuring compliance through industry-accepted frameworks such as SOC2, NIST, ISO27001, HITRUST, etc. The role is responsible for providing cyber security expertise and risk mitigation approaches between technical and non-technical domains.

The primary cyber focus areas include Cloud Security, Logging & Monitoring, Identity and Access Management, Application Vulnerability Management, Data Protection and the implementation of security requirements, design specifications, and compliance controls.