Advanced Search
Title
Company
Description

Location:

Start New Search:

python data
third party risk management
digital forensics
cyber intelligence
fso
crisc
cyber risk
it auditor
cyber security analyst
threat intelligence
public accounting firm
it risk
it service management
vulnerability management
identity and access management
siem
cism
malware
itsm
cia

Cyber Risk Senior Manager

Share Job
Suggest Revision
DeloitteChicago, IL
  • Cyber Fusion Senior Manager
  • Are you interested in improving the cyber and organizational risk profiles of leading companies?
  • Do you want to be strategic advisor to our clients, and lead projects ranging from Cyber Fusion strategic development to implementation of leading approaches to threat intelligence, analytics, detection and response?
  • Can you deal with changing requirements from project to project, learn what you need to get the job done, and produce accurate and timely results?
  • If yes, then Deloitte’s Cyber team could be the place for you!
  • Deloitte’s Cyber services help organizations create a cyber-minded culture and become stronger, faster, more innovative, and more resilient in the face of persistent and ever-changing cyber threats.
  • Join our team of Cyber professionals who focus on helping clients design and implement transformation enterprise security programs with an emphasis on defending against, recovering from, and remediating major cyberattacks.
  • We are currently hiring experienced talent at all levels from hands-on Cyber Fusion analysts through senior management and thought leaders.
  • As a Senior Manager for Deloitte's Cyber services, you’ll work with our diverse teams of leading professionals to help design and implement solutions to some of today’s toughest cybersecurity challenges so they can achieve business growth and manage risk.
  • In your role as a Senior Manager, you will support our clients in enhancing their capabilities in cyber threat detection and response, while leading multiple project delivery teams.
  • Increasing maturity of key Cyber Fusion capabilities across governance, people, processes and technology to help our clients achieve integrated cyber defense, proactively monitor, detect, investigate, and respond to known and unknown attacks
  • Providing Deloitte’s perspective on the effective approaches to Cyber Fusion development and operations, and collaborating with our client stakeholders on implementation roadmaps and execution
  • Working with our clients to identify, architect, and deploy security analytics and alerting solutions
  • Clearly articulating the role of Cyber Threat Intelligence in the cyber defense strategy, and integrating intelligence across defense disciplines such as risk, security architecture, monitoring / detection, vulnerability management, and application security.
  • Leading the development of actionable use cases to detect, triage, investigate and remediate based on latest threat actor trends, including actual technical implementation of parsing log sources creating, validating and testing alerting queries to reduce false positives.
  • Providing industry leading perspectives on augmenting existing Cyber Fusion processes to increase centralized visibility in order to identify suspicious activity to reduce the mean time to detect and respond to cyber threats.
  • Build enduring client relationships and expand the footprint of the firm
  • Lead multiple, cross region teams to deliver complex engagements for global clients
  • Manage pricing, profitability, and quality of deliverables
  • Drive development and manage the implementation of Cyber Fusion capabilities targeted on key client’s risk and business needs, and enhanced by leading practices across people, processes and technology including current state assessments
  • Design and manage the implementation of Cyber Fusion operating models, identifying, evaluating, and providing solutions to evaluate complex business via a threat-based approaches
  • Lead process walkthrough discussions to recommend improvements on end-to-end business processes and functional requirements based on latest Fusion Center / SOC trends
  • Design and manage the technical implementation of threat-based use cases in Security Information Event Management (SIEM) and threat analytic systems
  • Coordinate across multiple stakeholder groups and manage end-to-end concurrent projects
  • Execute services and supervise staff in delivering engagement services
  • Select and tailor approaches, methodologies and tools to support service offering or industry projects
  • Strive to exceed client expectations; build and nurture positive working relationships with clients
  • Responsible for effective project and program kickoff, identification of all program stakeholders, defining and clarifying program roles and responsibilities.
  • Manage day-to-day interactions with clients and internal Deloitte team
  • Display leadership and business judgment in anticipating client/project needs and developing alternative solutions
  • Track and communicate engagement performance and planning to Deloitte engagement management, ensuring project milestones remain on track and are completed timely and escalate risks as appropriate.
  • Responsible for project(s) financials including development of financial plans
  • Identify opportunities to improve engagement profitability
  • Participate and lead aspects of the proposal development process
  • Actively participate in the development of business and vendor relationships
  • Contribute to Deloitte’s thought leadership in client organizations and the external marketplace.
  • Actively mentor and train team members on Cyber Fusion processes, governance, and frameworks
  • Provide counseling/coaching, oversight, and support for delivery teams and staff
  • Participate actively in staff recruitment and retention activities providing input and guidance into the staffing process
  • Adopt a pragmatic approach to dealing with situations where confidentiality is important or where our work is of a sensitive nature.
  • Helping maintain our client’s strong professional relationships is integral to our business.
  • 5 + year minimum of work experience in at least two of as the following cybersecurity disciplines: Cyber Fusion Center, Security Operations Center, Network Security, Endpoint Security, Incident Response, Forensics, Threat Intelligence, Vulnerability Management
  • Bachelor of Science/Business Administration with a concentration in computer science, information systems, information security, math, decision sciences, risk management, engineering (mechanical, electrical, industrial) or equivalent work experience
  • In depth knowledge of general security concepts, such as defense-in-depth, least privilege, security architecture and design, threat modeling, etc.
  • Excellent communication, listening & facilitation skills
  • Demonstrated consulting skills (client service orientation, conflict resolution, analysis/synthesis of information, negotiation, project management, etc.)
  • Experience with SIEM technology (e.g. Splunk, IBM QRadar, Microsoft Sentinel, etc.)
  • or interpreting, searching, and manipulating data within enterprise logging solutions or IT Service Management (ITSM) tools, workflow, and automation
  • Experience extending enterprise security controls to the cloud
  • Proven leadership skills demonstrating strong judgment, problem-solving, and decision-making abilities
  • Experience managing senior-level client relationships
  • Experience mentoring and coaching others
  • Pre-sales, proposal, and RFP experience
  • Must be legally authorized to work in the United Stated without the need for employer sponsorship, now or at any time in the future.
  • Previous consulting experience
  • Master’s degree in Cybersecurity, Information Assurance or related field; Undergraduate degree in Computer Science or related field
  • Demonstrable personal interest in computing, security, and digital communication

Similar jobs:

Active
  • All Jobs
  • Active
FSO Technology Risk Senior - Cyber Risk
Ernst & YoungChicago, IL
Be able to interface with client stakeholders and subject-matter resources who own cybersecurity processes and controls such as information security governance, risk management, security operations and monitoring, threat intelligence, business continuity, incident response, privacy and third-party risk management.
Senior Manager, Cyber Security Services
Exelon Services, IncChicago, IL
This includes the Vulnerability Management team, OT Vulnerability Management team, Digital Forensics and Malware team, and the Cyber Security Systems Engineering team.
FSO Technology Risk Senior - Cyber Risk - Location Open
EYChicago, IL
own cybersecurity processes and controls such as information security governance, risk management, security operations and monitoring, threat intelligence, business continuity, incident response, privacy and third-party risk management.
Cyber Security Analyst
Booz Allen Hamilton IncChicago, IL
Collaborate with a team that delivers world-class Cybersecurity capabilities across vulnerability management, security testing, threat detection and cyber intelligence solutions to large enterprise customers in support of their overall Cyber Defense programs.
Full-time
Security Risk Assessor
Accenture Contractor JobsChicago, IL
Knowledge of various security program functions including: Cyber Architecture & Engineering, Security Operations, Incident Response, Cyber Threat Intelligence, Threat & Vulnerability Management, Identity & Access Management, Governance, Risk & Compliance, Security Education & Awareness, etc.
Full-time
blog.jobsearcher.com
CV vs Resume: What's the Difference?

Creating a resume or CV is a crucial first step in landing new professional and academic opportunities, but many don't know the dynamic when it comes to needing cv vs resume.

Security Risk Assessor
AccentureChicago, IL
+ Knowledge of various security program functions including: Cyber Architecture & Engineering, Security Operations, Incident Response, Cyber Threat Intelligence, Threat & Vulnerability Management, Identity & Access Management, Governance, Risk & Compliance, Security Education & Awareness, etc.
Full-time
Cyber Endpoint Security Senior Manager
DeilotteChicago, IL
Large scale system management through technologies such as mobile device management, Windows group policy, Puppet, Chef, Ansible, Salt, Jamf, Altiris and other technologies used to manage thousands of systems.
Manager Information Service, Cyber Security
Northwestern Memorial HospitalChicago, IL
Manage deployment and operation of the following security controls: Security Information and Event Management (SIEM), Network Intrusion Prevention System, Firewall, Email security gateway, Endpoint protection (Antivirus, Endpoint Detection and Response), Web Application Firewall, Vulnerability assessment tools.
Manager, Managed Security Services Senior Analyst
KPMGChicago, IL
Earned one or more of the following certifications preferred: GSEC (GIAC Security Essentials Certification), GISP (GIAC Information Security Professional), GMON (GIAC Continuous Monitoring Certification), GCIH (GIAC Certified Incident Handler), CCFP (Certified Cyber Forensics Professional), CCNP (Cisco Certified Network Professional), or Security toolset certification (vendor provided training, Microsoft)
Full-time
blog.jobsearcher.com
3 Elements to Consider When Asked "Why Do You Want to Work Here?"

If you are currently preparing for an interview, chances are you have come across the “why do you want to work here?” question, right? Although the reasons you have for wanting to work for a company may seem obvious to you, there is in fact a correct way to go about answering this question. 

Cyber Security Engineer Sr
StericycleChicago, IL
Knowledge of traditional security controls and technologies, such as Firewall, Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and DevSecOps, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies, and application controls.
Full-time
Senior IT
XylemChicago, IL
+ Knowledge with security platforms such as (Palo Alto Networks, Proofpoint, Qualys, SIEM, EDR, ServiceNow, etc
Senior Cybersecurity Analyst - Cyber Threat Intelligence (Remote)
United AirlinesChicago, IL
They will conduct advanced threat actor research, proactively hunt for threat actor activity, provide and implement recommendations on tool improvements, create actionable intelligence products, and provide guidance on, incident response, threat hunting, penetration testing and vulnerability assessment for United's electronic infrastructure.
Full-timeRemote
Senior IT Security Analyst (Palo Alto NGFW)
Xylem Inc.Chicago, IL
Knowledge with security platforms such as (Palo Alto NGFW, Proofpoint, Qualys, SIEM, EDR, ServiceNow, etc
Full-time
blog.jobsearcher.com
Complete Guide to Getting Paid on Federal Holidays

Everyone looks forward to federal holidays. For a lot of people, it’s more about getting the time off work than the holiday itself. 

Cyber Risk - Identity and Access Management Sr. Associate
Grant Thornton LLPChicago, IL
Associated topics: cybersecurity, iam, information assurance, information security, malicious, protect, security, threat, violation, vulnerability
Technical Cyber Risk Assessor, Senior
Booz Allen HamiltonChicago, IL
Experience with cyber risk and threat modeling assessments using common industry frameworks, including COBIT, NIST, FAIR or MITRE ATT&CK

Latest Blog Posts:

blog.jobsearcher.comHow to Decide Among the 4 Types of Interview AttireSo you’ve done it. You went ahead and submitted your resume to a few companies, and you ended up getting a call back for a job you think is perfect. You know you have to make a terrific impression at the interview, and that includes finding the right thing to wear. 
blog.jobsearcher.com9 Tips to Answer The Dreaded Salary Expectations Question + Example AnswersWhen it comes to the big “salary expectations” question in an interview, people often seem to dread this conversation. It can be awkward discussing salaries and finances at a job interview, but it is an important aspect of figuring out if the job is a good fit for you. 
blog.jobsearcher.com16 Lucrative Online Jobs for College StudentsStudents have it tough. They must get through mountains of schoolwork which leaves them little time to devote to a job. And no job means no money. The good thing is that online work is a great option for students. It cuts out the time and expense of a commute leaving them more time to devote to a job and studying. 
blog.jobsearcher.comHow to Decline An Interview: 3 Simple StepsEnsuring that a job is a good fit for you is key when on your job search. Getting called for an interview can seem like a great step in the right direction! Interviews take a lot of time and effort to prepare for, from researching the job and company, to making sure you know your resume back to front. 
blog.jobsearcher.com2 Ways to Formally Accept an OfferAccepting a job offer can be really exciting and a huge sigh of relief! You can pat yourself on the back once you’ve heard “you’re hired!”. Although formally accepting a job offer may seem like a simple task, it requires a little more thought and effort than you may have originally believed. Seeing as this process isn’t as easy as you may have hoped, this blog is going to guide you on how to accept a job offer the correct and professional way. 
blog.jobsearcher.com28 Easy Online Jobs for TeensIf you’re a teen looking to make extra money, an online job is the perfect way to do it. There are tons of online jobs for teens. When you work online, you cut out time-consuming commutes, so you can make money and still have plenty of time for schoolwork and hanging out with friends. 
blog.jobsearcher.com14 Interview Tips to Help Smoothly Navigate Your InterviewsSo, you worked hard to create a great resume and send it out to the right people. Now you got a call back. One of the employers wants to meet you and the job sounds great.