Lead Analyst, Cyber Design Review
Location: USI
Are you passionate about technology and interested in joining a community of collaborative colleagues who respectfully and courageously seek to challenge the status quo? If so, read on to learn more about an exciting opportunity with Deloitte’s Information Technology Services (ITS). We are curious and life-long learners focused on technology and innovation.
Work you’ll do
- Review assessment questionnaires and conduct interviews with project teams clarify responses
- Identify, communicate, and coordinate risk management activities such as vulnerability scanning, dynamic scans, confidentiality and privacy review etc.
- Prepare assessment reports for management to review and approve
- Evaluate technology solution privacy, confidentially, and security controls for compliance with company, regulatory, and legal requirements
- Analyze and make recommendations for security improvements to cloud services usage, configurations, and best practices.
- Evaluate Infrastructure -as-a-Service (IaaS) and Platform-as-a-Service (PaaS) vendor provided cloud services and document controls that manage the risk of usage
- Participate in security efforts for integration of infrastructure and business solutions with cloud environments
- Drive, influence, and guide project/technology teams in the development/acquisition of secure solutions
- Communicate improvement recommendations that enhance the secure posture of technology solutions
- Track and communicate assessment required activities and status to stakeholders
- Participate in the security governance model, establishing policies, standards and best practices
- Collect and maintain evidence supporting cyber assessment findings and recommendations
- Led the review technology solution architectures to confirm risk is appropriately managed, security requirements will be address, and conformance with policies/standards
The team
Information Technology Services (ITS) helps power Deloitte’s success, which serves many of the world’s largest, most respected organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.
The ~3,000 professionals in ITS deliver services including:
- Cyber Security
- Technology Support
- Technology & Infrastructure
- Applications
- Relationship Management
- Strategy & Communications
- Project Management
- Financials
Cyber Security
Cyber Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand.
Areas of focus include:
- Risk & Compliance
- Identity & Access Management
- Data Protection
- Cyber Design
- Incident Response
- Security Architecture
- Business Partnership
Qualifications
Required:
- Bachelor’s degree in Computer Science or Business Administration, or relevant educational or professional experience
- Minimum 4 years of experience working with IT systems, managing technology, managing IT projects, and administrating systems
- Excellent communication, report writing and presentation skills
- Ability to work independently and also cross functionally
- Excellent time management and related organizational skills, including appropriate sense of urgency, a proactive approach, and a suitable ability to anticipate and manage project lifecycle events, issues and obstacles
- Consulting skills (client service orientation, conflict resolution, analysis/synthesis of information, negotiation, project management, etc.)
- Excellent communication, listening and facilitation skills
Preferred:
· Experience with Azure and/or Amazon Web Services (AWS) security
· Experience assisting with the development of security related architectural designs
· Security certifications such as Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Associate of ISC2, Certified Ethical Hack (CEH), or Certified Cloud Security Professional (CCSP)
· A background in general security practices such as identity and access management (IAM), encryption, and multi-factor authentication, security information and event management (SIEM), and others
· Knowledge of cyber security standards and frameworks such as ISO 27001 or NIST 800-32