Deloitte Jobs

Job Information

Deloitte Cyber Endpoint Security - Sr Consultant in Baltimore, Maryland

Cyber Endpoint Security - Sr Consultant

Are you passionate about the common cyber and security challenges associated with threats and vulnerabilities? Are you are interested in an opportunity to change the way companies manage these risks and to design and provide innovative solutions which directly impact leading organizations and enterprises across the globe? If yes, then Deloitte s Cyber Risk team could be the place for you! Join our team of Cyber Risk professionals who collaborate with other endpoint security experts, IT professionals, and clients to support cyber security, risk consulting, and managed service engagements. We are currently hiring experienced talent at all levels from more hands-on endpoint security specialists through senior management and thought leaders. We are looking for those with experience in either endpoint security or infrastructure security or both.

Assist in the selection and tailoring of approaches, methods, and tools to support endpoint security service offerings and client engagements. Assess and build high-level and detailed endpoint security programs translating business needs, architecture, operational structure, and compliance and/or regulatory requirements into cost effective and risk appropriate controls, processes, and procedures tailored to our client s needs. Identify opportunities to optimize programs and services in an effort to reduce the overall level of effort and costs associated with managing infrastructure level vulnerabilities. Obtain and utilize knowledge of client business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management.

Work you ll do

As an Endpoint Security Sr Consultant in the Cyber Risk group you will:

  • Involve/Participate/Contribute/Lead workstreams on engagements related but not limited to endpoint security including mobile threat defense, endpoint detection and response, and system hardening. Large scale system management through technologies such as mobile device management, Windows group policy, Puppet, Chef, Ansible, Salt, Jamf, Altiris and other technologies used to manage thousands of systems.

  • Provide technical guidance, architecture, installation, configuration, and/or operation for solutions used across the entire lifecycle of endpoint security including provisioning, securing, monitoring, remediating, reporting, ticketing as well as the integration and automation of these various components

  • Provide input, guidance and direction on the overall market offering(s) related to endpoint security and play an active role in evangelizing, building and developing our portfolio

  • Support/Involve/Participate/Contribute/Lead implementation and operational best practices while taking ownership of tasks and/or project workstreams and guiding more junior professionals

  • Quickly absorb and diagnosis communication challenges within and across work teams

  • Provide consulting on various strategy and technology implementation projects

  • Perform analysis and diagnosis of client issues related to technology configuration and setup as well as procedural or process challenges

  • Contribute to deliverables and review the work of others for quality and accuracy

  • Demonstrate an understanding of the client s environment and overall project scope

  • Demonstrate experience developing work plans, milestones and engagement schedules

  • Exhibit superior organizational skills to analyze, develop, and deliver detailed reports meeting tight suspense windows

  • Clearly and professionally communicate with client personnel to understand and manage expectations, gather information, and present and deliver results

  • Manage and mentor more junior professionals

  • Contribute response for potential customer RFP s and design/customize solutions based on their requirements

The Team

As it becomes increasingly difficult to prevent infiltrations and unauthorized activity, organizations need threat awareness and advanced detection and intelligence solutions to rapidly identify unauthorized or anomalous activity in their environments. Vigilant services leverage deep experience with analytic and correlation technologies to help clients develop monitoring capabilities focused on critical business processes. By integrating threat and vulnerability data, IT data, and business data, security teams are equipped with context-rich alerts to help prioritize incident handling and streamline incident investigation. Our clients can t close vulnerabilities and can t respond to threats they can t see. Our team can help. Deloitte s Vigilant Services are part of its overall Cyber Risk services offering.

For more information, see https://www2.deloitte.com/us/en/pages/risk/solutions/cyber-risk-services.html

Category: Information Technology

About Deloitte

As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.

DirectEmployers