Placement & Recruitment Service Provider at Phenom Placements
Views:7150 Applications:218 Rec. Actions:Recruiter Actions:15
Senior Manager - Cyber Security - Business & Practice Development - Big4 (9-16 yrs)
Employer : Big 4
Job Location : Mauritius
Profile : Sr Manager- Cyber Security - Business and practice development
Exp : Min 9 yrs+
Roles and Responsibilities :
Business and practice development
- Building client relationships and establishing credibility by demonstrating knowledge of various aspects of cyber security, and identify opportunities where firm can assist.
- Supporting senior members of the team in developing client proposals and solution offerings.
- Managing project financials in line with agreed-upon budgets
- Driving the development of toolkits, methodologies and accelerators.
- Providing thought leadership and direction for the cyber security practice.
- Creating a positive working environment by monitoring and managing workloads of the team - balancing client expectations with the work-life quality of team members;
- Providing candid, meaningful feedback in a timely manner to team members;
- Keeping leadership and engagement management informed of progress and issues.
Client service
- Managing and delivering cyber security and cyber risk assignments, including producing documentation and reports, and quality assuring the work produced by junior team members.
- Working as a subject matter expert in your particular field to support a team, and/or managing a larger team in delivering engagements at scale.
- Maintaining awareness of key business and industry trends, and understanding how they impact responses to cyber risk.
- Design and development of IT Risk and Cyber security programs using industry frameworks and methodologies.
- Implementation and maintenance of enterprise-wide cyber risk governance frameworks.
- Assessment of enterprise-wide business risks and cyber threats, design and implementation of cyber risk management controls
- Championing the delivery of the highest quality services to firm's clients, and actively managing and mentoring junior team members to do the same, while managing the risks to the firm.
- Conduct penetration tests on both business critical infrastructure and applications to support the organizations risk management program.
- Scope and deliver security testing engagements on time and within budget according to stakeholder requirements and organization needs.
- Provide quality assurance and technical reviews of deliverables, results and internal documentation (peer review)
- Evaluate remediation suggestions and provide consultative support with implementation of remediation steps, standards, and best practices where needed.
- Understand and consider industry trends, customer needs, business risk tolerance, and business environments relating to information security.
- Understand and clearly communicate potential threats, vulnerabilities, and control techniques.
- Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, anti-forensics, and detailed system usage
- Hunt and respond to advanced adversaries such as nation-state actors, organized crime, and hacktivists
- Extract files from network packet captures and proxy cache files, allowing follow-on malware analysis, or definitive data loss determinations
- Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation.
- Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment
- Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections
- Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence
- Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections etc
- Track user and attacker activity second-by-second on the system via in-depth timeline and super-timeline analysis
- Identify lateral movement and pivots within client enterprises, showing how attackers transition from system to system without detection.
- Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments
Please send your CV with below details if this suits your requirement:
1. Current Salary
2. Expected Salary
3. Current Employer
4. Current Location
5, Current Location
6. Ok for Mauritius-Yes/ no
7. Skype ID-
Saket
Phenom Placement
This job opening was posted long time back. It may not be active. Nor was it removed by the recruiter. Please use your discretion.