Where you will be thriving : Our client is a leading global provider of assurance, consulting & risk advisory services. The value that the Risk Advisory creates for organisations is synonymous with operational excellence, advising clients on how to effectively mitigate risk and make informed and intelligent risk decisions around business processes, technology, and operations.
Every day, your work will make an impact that matters, while you thrive in a dynamic culture of inclusion, collaboration, and high performance.
The main purpose of the job Is to support the business leadership in the implementation of strategic plans. Focus on the management and delivery of client engagements, as well as sales and practice development, in an environment where you know what the pressures are around shared infrastructure and complex Routing and Switching and understands what segmentation means in that kind of context, not just theoretical understanding, but hands-on experience consulting to large corporate clients.
Assess, lead, define, design and implement end to-end modern on premise and cloud based Cyber Solutions Owns end-to-end delivery of cyber Infrastructure programs across medium and large accounts Develop high-performing people and teams, leading and supporting them to make an impact that matters, and setting the direction to deliver exceptional client service.
Minimum Experience & Qualifications required to apply : Relevant Degree OR QBE (Qualified by Experience) 10 - 12 years of progressive experience with role(s) in a professional, consulting services (including Boutique Security Firm), public and / or private sector organizations is required.
7 years in a client facing role; 5 of these in a management role Excellent understanding of an IP addressing and how it works (IPv4 and IPv6) Deep knowledge and experience with ability to perform : Security reviews of architecture and application designs Mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing Exploit vulnerabilities to gain access, and expand access to remote systems Assist with building, hardening, and maintaining systems used for penetration testing Research cutting edge security topics and new attack vectors Technical Capabilities required : Proven record of success in Security Technologies such as : Firewalls, IDS / IPS, Endpoint Security Solutions, Access Control Systems, And Other Related Security Technologies Bring deep technical and industry experience in Cyber Infrastructure domain to engage with clients and key stakeholders pragmatically.
In depth understanding of operating systems, network / system architecture, and IT architecture design. Cisco, Checkpoint, Palo Alto, Fortinet experience highly desirable.
In depth understanding of infrastructure and network architecture and design, LAN / WAN implementation, and Windows / Linux environments.
Understanding of threats, vulnerabilities, and exploits in different environments and appropriate mitigation techniques.
Understanding of relevant Cyber / Information / Cloud security related laws and regulations To Plan and Manage Cyber Solutions.
Proven experience in winning business, staff development, exceptional delivery, business development, continuous improvement The ability to guide teams through the design and implementation of cyber solutions in chosen Cyber sub-offering / s that reduce vulnerability, strengthen cyber security posture / controls and optimize organizational efficiency Good understanding of an IP address and how it works Security reviews of architecture and application designs mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing Exploit vulnerabilities to gain access, and expand access to remote systems Assist with building, hardening, and maintaining systems used for penetration testing Research cutting edge security topics and new attack vectors OEM product certifications Functions : Sets Strategy for and Sustains Implementation of Cyber Strategy Programmes : Ability to lead clients through end to-end design and delivery of targeted, holistic, and sustainable cyber security technology strategy programmes.
advises client accordingly Technical competencies : Good technical capability and technical certifications in a combination of some of the following : CCIE / CREST / OSCE / OSCW / Crest / CEH / OSCP / GCIH / CISSP / CISSP-ISSAP / CISSP-ISSEP / CISSP-ISSMP Business analysis Software development and engineering including DevSecOps : fundamentals and experience IT System and networks design, build and administration Project Management including Agile Project Management (SAFE Agile, etc.
Microservices, containerisation, server-less / FaaS and DevOps toolsets (CI / CD pipeline) Software Programming / Coding background Related Technical fundamentals at that point in time and what the market is procuring