Risk Advisory - Cyber Infrastructure - Senior Manager

  • Deloitte
  • Midrand, South Africa
  • 17/11/2021
Full time

Description

The main purpose of the job is to support the business leadership in the implementation of strategic plans.

Focus on the management and delivery of client engagements, as well as sales and practice development.

Develop high-performing people and teams, leading and supporting them to make an impact that matters, and setting the direction to deliver exceptional client service. 

Specialised Technical Capabilities:

Sets Strategy for and Sustains Implementation of Cyber Strategy Programmes:

·  Ability to lead clients through end to-end design and delivery of targeted, holistic, and sustainable cyber security technology strategy programmes.

·  Helps client adopt a long-term view of cyber risk management by advising on leading practices to align cyber risk with risk appetite, key industry issues, and strategic business priorities

·  Owns end-to-end delivery of executive level cyber strategy programs across large and complex accounts

·  Leverages a strong industry knowledge to advise clients on current and potential changes in regulations, cyber threats, and other key trends

·  Leads stakeholders in building support and buy-in from Board of Directors to successfully enable and sustain overarching cyber risk strategies

·  Builds a brand within a chosen domain and industry and is regarded internally and externally as a subject matter expert

·  Stays current on market trends and regulations, and anticipates risk / opportunities; advises client accordingly

Technical competencies:

·   Expert in field with sound industry and business knowledge

·   Proven experience winning business, staff development, exceptional delivery, business development, continuous improvement

·   Bring deep technical (SME) and industry experience in selected Cyber sub offering (domain) to engage with clients and key stakeholders pragmatically.

·   Excellent understanding of an IP address and how it works (IPv4 and IPv6)

·   Deep knowledge ability to perform:

   o  security reviews of architecture and application designs

   o  mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing

   o  Exploit vulnerabilities to gain access, and expand access to remote systems

   o  Assist with building, hardening, and maintaining systems used for penetration testing

   o  Research cutting edge security topics and new attack vectors

·  Demonstrates thorough knowledge and/or proven record of success in security technologies such as firewalls, IDS/IPS, endpoint security solutions, access control systems, and other related security technologies

·  In depth understanding of operating systems, network/system architecture, and IT architecture design;

·  In depth understanding of infrastructure and network architecture and design, LAN/WAN implementation, and Windows/Linux environments;

·  Understanding of threats, vulnerabilities, and exploits in different environments and appropriate mitigation techniques.

·  Understanding of relevant Cyber/Information/Cloud security related laws and regulations

Good technical capability and technical certifications in the following areas:

·   An industry leading qualification such as CREST, OSCE, OSCW, Crest, Check

·   CEH (Certified Ethical Hacker)

·   OSCP (Offensive Security Certified Professional

·   GCIH (GIAC Certified Incident Handler)

·   Certified Information Systems Security Professional (CISSP)

·   Information Systems Security Architecture Professional (CISSP-ISSAP)

·   Information Systems Security Engineering Professional (CISSP-ISSEP)

·  Information Systems Security Management Professional (CISSP-ISSMP)

·  Ability to identify patterns, and analyse and improve processes (business analysis)

·  Software development and engineering including DevSecOps: fundamentals and experience

·  IT System and networks design, build and administration

·  Project Management including Agile Project Management (SAFE Agile, etc.)

·  Microservices, containerisation, server-less/FaaS and DevOps toolsets (CI/CD pipeline)

·  Software Programming/Coding in variety of languages

·  Related Technical fundamentals at that point in time and what the market is procuring

Behavioural Competencies:

·  Exceptional communication skills, both written and verbal

·  Able deliver multiple engagements on time and within budget

·  Proven ability to make decisions and the right judgement calls in complex projects and situations

·  Creates a culture of trust, ownership and accountability across teams and projects

·  On the job coaching for managers and professional staff and taking accountability for multiple large engagements

·  Manages large engagement / multiple engagement deadlines holistically, identifying risks and escalating

·  Able to work under pressure

·  Drives continuous improvement

·  Custodian of the business, shaping offerings that we need to proactively take to the market

Qualifications

Minimum qualifications:

Relevant Degree, honours or post graduate diploma, professional qualifications e.g. B.Sc, B.Com, or B.Ing/Eng or MSc

Desired qualifications:

Advanced certifications, diplomas, professional certifications, advanced degrees in Cyber or information security - examples include:

·  CISM (Certified Information Security Manager)

·  CISSP (Certified Information Systems Security Professional)

·  An industry leading qualification such as CREST, OSCE, OSCW, Crest, Check

·  CEH (Certified Ethical Hacker)

·  OSCP (Offensive Security Certified Professional

·  GCIH (GIAC Certified Incident Handler)

·  Certified Information Systems Security Professional (CISSP) or suitable hands-on experience is required.

Experience:

7 years in a client facing role; 5 of these in a management role

10 -12 years of progressive experience with role(s) in a professional, consulting services (including Boutique Security Firm), public and/or private sector organizations is required.

·  Excellent understanding of an IP addressing and how it works (IPv4 and IPv6)

·  Deep knowledge and experience with ability to perform:

   o  security reviews of architecture and application designs

   o  mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing

   o  Exploit vulnerabilities to gain access, and expand access to remote systems

   o  Assist with building, hardening, and maintaining systems used for penetration testing

   o  Research cutting edge security topics and new attack vectors

Additional Information

How you’ll grow

At Deloitte, our professional development plan focuses on helping people at every level of their career to identify and use their strengths to do their best work every day. From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to help build world-class skills in addition to hands-on experience in the global, fast-changing business world. From on-the-job learning experiences to formal development programs at Deloitte University, our professionals have a variety of opportunities to continue to grow throughout their career. Explore Deloitte University, The Leadership Centre. https://deloitte.zoomforth.com/du 

Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. https://www2.deloitte.com/global/en/pages/careers/articles/benefits.html

Our purpose

Deloitte is led by a purpose: to make an impact that matters. Every day, Deloitte people are making a real impact in the places they live and work. We pride ourselves on doing not only what is good for clients, but also what is good for our people and the communities in which we live and work—always striving to be an organization that is held up as a role model of quality, integrity, and positive change. Learn more about Deloitte’s impact on the world. https://www2.deloitte.com/global/en/pages/about-deloitte/articles/impact-that-matters.html

*Please note that this job advertisement provides a summary of the capabilities required and all candidates shortlisted will receive a full list of capabilities.

We do not ask for any fees (refundable or non-refundable) at any stage of the job application and or recruitment process. We, therefore, appeal to job seekers not to respond to any such requests.

No