Job Description
Work you'll do
- Review assessment questionnaires and conduct interviews with project teams clarify responses.
- Identify, communicate, and coordinate risk management activities such as vulnerability scanning, dynamic scans, confidentiality, and privacy review etc.
- Participate in security efforts for integration of infrastructure and business solutions with cloud environments.
- Track and communicate assessment required activities and status to stakeholders.
- Participate in the security governance model, establishing policies, standards, and best practices.
The team
Deloitte Technology US (DT - US) helps power Deloitte's success, which serves many of the world's largest, most respected organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.
The ~3,000 professionals in DT - US deliver services including:
- Cyber Security
- Technology Support
- Technology & Infrastructure
- Applications
- Relationship Management
- Strategy & Communications
- Project Management
Cyber Security
Cyber Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes in business strategies, risks, and vulnerabilities. Using situational awareness, threat intelligence, and building a security culture across the organization, the team helps to protect the Deloitte brand.
Areas of focus include:
- Risk & Compliance
- Identity & Access Management
- Data Protection
- Cyber Design
- Incident Response
- Security Architecture
Required Qualifications:
- Bachelor's degree or equivalent in Computer Science, Business Administration, Information Systems.
- Minimum 2 years overall various technology experience ideally with some mix of performing security/risk related assessments, reviews, or audits.
Preferred Qualifications:
- Experience assisting with the development security related architectural designs.
- A background in general security practices such as identity and access management (IAM), encryption, and multi-factor authentication, security information and event management (SIEM), and others.
- Experience of cyber security standards and frameworks such as ISO 27001 or NIST 800-32.