Deloitte Cyber Risk Vulnerability Management Senior Consultant in Detroit, Michigan

Cyber Vulnerability Management- Sr. Consultant

Are you passionate about the common cyber and security challenges associated with threats and vulnerabilities? Are you are interested in an opportunity to change the way companies manage these risks and to design and provide innovative solutions which directly impact leading organizations and enterprises across the globe? If yes, then Deloitte s Cyber Risk team could be the place for you! Join our team of Cyber Risk professionals who collaborate with other Vulnerability Management (VM) experts, IT professionals, and clients to support cyber security, risk consulting, and managed service engagements. We are currently hiring experienced talent at all levels from more hands-on vulnerability management specialists through senior management and thought leaders. We are looking for those with experience in either infrastructure layer or application layer vulnerability management or both.

Assist in the selection and tailoring of approaches, methods, and tools to support vulnerability management service offerings and client engagements. Assess and build high-level and detailed vulnerability management programs translating business needs, architecture, operational structure, and compliance and/or regulatory requirements into cost effective and risk appropriate controls, processes, and procedures tailored to our client s needs. Identify opportunities to optimize VM programs and services in an effort to reduce the overall level of effort and costs associated with managing both application level and infrastructure level vulnerabilities. Obtain and utilize knowledge of client business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management.

Work you ll do

As a VM Sr. Consultant in the Cyber Risk group you will:

  • Support and/or lead workstreams on engagements related but not limited to application security testing, infrastructure vulnerability scanning, reviewing and prioritizing results, and remediation and/or coordinating the remediation of assessment results

  • Provide technical guidance, architecture, installation, configuration, and/or operation for solutions used across the entire lifecycle of vulnerability management including asset management, scanning/testing, threat intelligence, analysis, reporting, ticketing as well as the integration of these various solutions and technologies

  • Provide input, guidance and direction on the overall market offering(s) related to Vulnerability Management and play an active role in evangelizing, building and developing our portfolio

  • Contribute to and play an active role in developing resources and designing delivery capacity across our global firm

  • Support implementation and operational best practices while taking ownership of tasks and/or project workstreams and guiding more junior professionals

  • Quickly absorb and diagnosis communication challenges within and across work teams

  • Perform analysis and diagnosis of client issues related to technology configuration and setup as well as procedural or process challenges

  • Contribute to deliverables and review the work of others for quality and accuracy

  • Demonstrate an understanding of clients environment and overall project scope

  • Demonstrate experience developing work plans, milestones and engagement schedules

  • Exhibit superior organizational skills to analyze, develop, and deliver detailed reports meeting tight suspense windows

  • Clearly and professionally communicate with client personnel to understand and manage expectations, gather information, and present and deliver results

  • Manage and mentor more junior professionals

The Team

As it becomes increasingly difficult to prevent infiltrations and unauthorized activity, organizations need threat awareness and advanced detection and intelligence solutions to rapidly identify unauthorized or anomalous activity in their environments. Vigilant services leverage deep experience with analytic and correlation technologies to help clients develop monitoring capabilities focused on critical business processes. By integrating threat and vulnerability data, IT data, and business data, security teams are equipped with context-rich alerts to help prioritize incident handling and streamline incident investigation. Our clients can t close vulnerabilities and can t respond to threats they can t see. Our team can help. Deloitte s Vigilant Services are part of its overall Cyber Risk services offering.

For more information, see https://www2.deloitte.com/us/en/pages/risk/solutions/cyber-risk-services.html

Category: Information Technology

About Deloitte

As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.