National Consulting - Detroit - Consultant Development Program - Technology Consulting - Cybersecurity Consulting Staff - S/F 2021
Consulting
Requisition # DET001M2
Post Date 5 days ago
When you join our Technology Consulting- Cybersecurity Consulting practice as a staff, youre a part of our Consultant Development Program. Youll be provided learning opportunities, technical competency training, and coaching to develop core consulting skills. Each individual experience will vary but this Program will enable differential experiences through varied account and engagement alignments.
The opportunity
The cybersecurity landscape is in a constant state of change. Organizations today must increasingly rely on new and disruptive technologies to help them grow and differentiate in the evolving marketplace. Organizations that lack effective cybersecurity measures to help manage this change, face breaking the trust of their customers, stakeholders, and the marketplace while exposing themselves to ever increasing risk. Our Cybersecurity practice works with a broad range of clients to assist them in gaining insights to their cybersecurity risks through a variety of assessments, transformational program strategy designs, and technology implementations. EY's Cybersecurity solutions are organized within five competencies, which includes the following:
Strategy, Risk, Compliance and Resilience - These solutions help organizations evaluate the effectiveness and efficiencies of their cybersecurity program in context of the business growth and operations strategies.
Data Protection and Privacy - These solutions are designed to help organizations protect their information over the full data lifecycle - from acquisition to disposal. The service offering helps companies and organizations stay up to date with data security and data privacy good practices, as well as compliancy with regulation, in a constantly evolving threat environment and regulatory landscape.
Identity and Access Management -These solutions are designed to help organizations with their definition of access management strategy, governance, access transformation, and ongoing operations. The solutions help organizations ensure the right users validate who they are and get access to the right organization resources.
Architecture, Engineering, and Emerging Technology -These solutions are designed to help organizations protect themselves from adversaries that would seek to exploit weaknesses in the design, implementation, and operation of their technical security controls, including disruptive technologies in the marketplace.
Next Generation Security Operations and Response - These solutions help organizations proactively identify and manage risk, monitor threats, and investigate the effects of real-world attacks.
You'll work alongside respected Cybersecurity professionals across diverse set of clients and industry sectors, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing cybersecurity risks faced by our clients. It's a highly specialized area, where you'll learn highly sought-after technical skills, all while developing your relationship management abilities - often by working directly on-site with our clients.
What to expect
Based on your existing experience, knowledge and ambitions, you could have the opportunity to gain experience across a number of our Cybersecurity competencies and solutions, assessing and delivering foundational components of our services.
Your key responsibilities
Understanding clients' cultures and operations to influence important decisions on cyber risks
Growing lasting relationships with our clients, understanding their needs, and consistently delivering quality client services.
Helping clients drive business-led and technology-enabled transformation across a broad range of cybersecurity and business issues.
Understanding and documenting clients' technology processes and requirements, performing root cause analyses, developing business use cases, and gathering information.
Monitoring progress, managing risks and ensuring key stakeholders are kept informed about progress and expected outcomes.
Developing specific skills with software packages from leading enterprise application vendors.
Taking full responsibility for tasks including consistent self-review of work to identify and improve an approach for producing high quality work products, while working under supervision.
Constantly updating your understanding of cybersecurity and industry trends.
To qualify for the role you must have
A Bachelor's or Master's degree in a relevant technology discipline, e.g., Computer Science, Information Systems, Math, IT Security, Operational Technology, Information Technology, Technology Risk, Computer or other related Engineering
Desire to work in consulting demonstrated by relevant course work, interest or internship experience
The flexibility and willingness to travel as well as work in excess of standard hours when necessary
The understanding that travel is an essential function of the job and is estimated at 80%
Proficiency with MS Office, including MS Excel, MS Word and MS PowerPoint
Willingness and ability to learn and work independently with minimal supervision
Demonstrated project management, teaming, organizational, analytical and problem-solving skills
Strong root-cause analysis experience and skills as well as the ability to identify strengths and weaknesses in a client's processes and controls
Excellent interpersonal, written and verbal communication skills
Effective organization and time management skills with the ability to work under pressure and adhere to project deadlines
Ability to work independently in both on-site and remote working environments
Integrity within a professional environment
A driver's license valid in the U.S.
Candidates interested in the Government & Public Sector industry focus must have sole U.S. citizenship and be able to obtain and maintain a secret clearance or higher, within the designated timeframe, which will be determined by the engagement requirements for a security clearance
Ideally, you'll also have some of the following skills
Training in programming languages such as Java, C, C++, C#, asp, and .NET
Proven Unix, Windows, networking and wireless security skills
A deep understanding of TCP/IP networking
System design experience that addresses business issues and risks
Technical skills in a broad range of operating systems and databases
Knowledge of intelligence collection disciplines including SIGINT, HUMINT and OSINT
An understanding of emerging threat characterization frameworks such as OpenIOC, STiX, CybOX and MAEC
The ability to perform basic static and dynamic malware analyses
Familiarity with network-based vulnerability exploitation tools
A firm grasp of application security source code assessments
Experience with EnCase, FTK, or Sleuthkit
Knowledge of emerging technologies, the risks they introduce into an environment and how to design mitigating processes and controls to