Deloitte Cyber Vulnerability Management Consultant in McLean, Virginia

Cyber Vulnerability Management Consultant

Are you passionate about the common cyber and security challenges associated with threats and vulnerabilities? Are you are interested in an opportunity to change the way companies manage these risks and to design and provide innovative solutions which directly impact leading organizations and enterprises across the globe? If yes, then Deloitte s Cyber Risk team could be the place for you! Join our team of Cyber Risk professionals who collaborate with other Vulnerability Management (VM) experts, IT professionals, and clients to support cyber security, risk consulting, and managed service engagements. We are currently hiring experienced talent at all levels from more hands-on vulnerability management specialists through senior management and thought leaders. We are looking for those with experience in either infrastructure layer or application layer vulnerability management or both.

Assist in the selection and tailoring of approaches, methods, and tools to support vulnerability management service offerings and client engagements. Assess and build high-level and detailed vulnerability management programs translating business needs, architecture, operational structure, and compliance and/or regulatory requirements into cost effective and risk appropriate controls, processes, and procedures tailored to our client s needs. Identify opportunities to optimize VM programs and services in an effort to reduce the overall level of effort and costs associated with managing both application level and infrastructure level vulnerabilities. Obtain and utilize knowledge of client business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management.

Work you ll do

As a VM Consultant inthe Cyber Risk group you will:

  • Support workstreams on engagements related but not limited to application security testing, infrastructure vulnerability scanning, reviewing and prioritizing results, and remediation and/or coordinating the remediation of assessment results

  • Provide technical guidance, architecture, installation, configuration, and/or operation for solutions used across the entire lifecycle of vulnerability management including asset management, scanning/testing, threat intelligence, analysis, reporting, ticketing as well as the integration of these various solutions and technologies

  • Provide input, guidance and direction on the overall market offering(s) related to Vulnerability Management and play an active role in evangelizing, building and developing our portfolio

  • Contribute to and play an active role in developing resources and designing delivery capacity across our global firm

  • Support implementation and operational best practices while taking ownership of task workstreams

  • Quickly absorb and diagnosis communication challenges within and across work teams

  • Perform analysis and diagnosis of client issues related to technology configuration and setup as well as procedural or process challenges

  • Contribute to deliverables with quality and accuracy

  • Demonstrate an understanding of clients environment and overall project scope

  • Contribute to developing work plans, milestones and engagement schedules

  • Exhibit superior organizational skills to analyze, develop, and deliver detailed reports meeting tight suspense windows

  • Clearly and professionally communicate with client personnel to understand and manage expectations, gather information, and present and deliver results

The Team

As it becomes increasingly difficult to prevent infiltrations andunauthorized activity, organizations need threat awareness and advanceddetection and intelligence solutions to rapidly identify unauthorized oranomalous activity in their environments. Vigilant services leverage deepexperience with analytic and correlation technologies to help clients developmonitoring capabilities focused on critical business processes. By integratingthreat and vulnerability data, IT data, and business data, security teams areequipped with context-rich alerts to help prioritize incident handling andstreamline incident investigation. Our clients can t close vulnerabilities andcan t respond to threats they can t see. Our team can help. Deloitte s VigilantServices are part of its overall Cyber Risk services offering.

For more information,see https://www2.deloitte.com/us/en/pages/risk/solutions/cyber-risk-services.html

Category: Information Technology

About Deloitte

As used in this document, Deloitte means Deloitte LLP and its subsidiaries. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.