Deloitte Cyber Threat Vulnerability Manager in Boston, Massachusetts
Cyber Vulnerability Management-Manager
Are you passionate about the common cyber and security challenges associated with threats and vulnerabilities? Are you are interested in an opportunity to change the way companies manage these risks and to design and provide innovative solutions which directly impact leading organizations and enterprises across the globe? If yes, then Deloitte s Cyber Risk team could be the place for you! Join our team of Cyber Risk professionals who collaborate with other Vulnerability Management (VM) experts, IT professionals, and clients to support cyber security, risk consulting, and managed service engagements. We are currently hiring experienced talent at all levels from more hands-on vulnerability management specialists through senior management and thought leaders. We are looking for those with experience in either infrastructure layer or application layer vulnerability management or both.
Assist in the selection and tailoring of approaches, methods, and tools to support vulnerability management service offerings and client engagements. Assess and build high-level and detailed vulnerability management programs translating business needs, architecture, operational structure, and compliance and/or regulatory requirements into cost effective and risk appropriate controls, processes, and procedures tailored to our client s needs. Identify opportunities to optimize VM programs and services in an effort to reduce the overall level of effort and costs associated with managing both application level and infrastructure level vulnerabilities. Obtain and utilize knowledge of client business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management.
Work you ll do
As a VM Manager in the Cyber Risk group you will:
Lead workstreams on engagements related but not limited to application security testing, infrastructure vulnerability scanning, reviewing and prioritizing results, and remediation and/or coordinating the remediation of assessment results
Provide technical guidance, architecture, installation, configuration, and/or operation for solutions used across the entire lifecycle of vulnerability management including asset management, scanning/testing, threat intelligence, analysis, reporting, ticketing as well as the integration of these various solutions and technologies
Provide input, guidance and direction on the overall market offering(s) related to Vulnerability Management and play an active role in evangelizing, building and developing our portfolio
Contribute to and play an active role in developing resources and designing delivery capacity across our global firm
Support implementation and operational best practices while taking ownership of tasks and/or project workstreams and guiding more junior professionals
Quickly absorb and diagnosis communication challenges within and across work teams
Perform analysis and diagnosis of client issues related to technology configuration and setup as well as procedural or process challenges
Contribute to deliverables and review the work of others for quality and accuracy
Demonstrate an understanding of clients environment and overall project scope
Demonstrate experience developing work plans, milestones and engagement schedules
Exhibit superior organizational skills to analyze, develop, and deliver detailed reports meeting tight suspense windows
Clearly and professionally communicate with client personnel to understand and manage expectations, gather information, and present and deliver results
Manage and mentor more junior professionals
As it becomes increasingly difficult to prevent infiltrations and unauthorized activity, organizations need threat awareness and advanced detection and intelligence solutions to rapidly identify unauthorized or anomalous activity in their environments. Vigilant services leverage deep experience with analytic and correlation technologies to help clients develop monitoring capabilities focused on critical business processes. By integrating threat and vulnerability data, IT data, and business data, security teams are equipped with context-rich alerts to help prioritize incident handling and streamline incident investigation. Our clients can t close vulnerabilities and can t respond to threats they can t see. Our team can help. Deloitte s Vigilant Services are part of its overall Cyber Risk services offering.
For more information, seehttps://www2.deloitte.com/us/en/pages/risk/solutions/cyber-risk-services.html
Category: Information Technology