DescriptionDescription:
Contribute to leadingedge security and resilience efforts advancing protective strategies and propelling continuous improvement.
As an Assessments & Exercises Senior Associate inCybersecurity and Technology Controls you will contribute significantly to enhancing the firms cybersecurity or resiliency posture by using industrystandard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people processes and technology. Design and deploy riskdriven tests and simulations (or manage a highlyskilled team that does) and inform analysis to clearly outline rootcauses. In this role evaluate preventative controls incident response processes and detection capabilities and advise crossfunctional teams on security strategy and risk management.
Job responsibilities
- Design and execute testing and simulations such as penetration tests technical controls assessments and contribute to the development and refinement of assessment methodologies tools and frameworks to ensure alignment with the firms strategy and compliance with regulatory requirements
- Evaluate controls for effectiveness and impact on operational risk as well as opportunities to automate control evaluation
- Collaborate closely with crossfunctional teams to develop comprehensive assessment reports including detailed findings risk assessments and remediation recommendations making datadriven decisions that encourage continuous improvement
- Utilize threat intelligence and security research to stay informed about emerging threats vulnerabilities industry best practices and regulations. Apply this knowledge to enhance the firms assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analytics
Required qualifications capabilities and skills
- Formal training or certification on software engineering concepts and 3 years applied experience in cybersecurity or resiliency
- Excellent command of Cybersecurity organization practices operations risk management processes principles architectural requirements engineering and threats and vulnerabilities including incident response methodologies
- Ability to analyze vulnerabilities threats designs procedures and architectural design producing reports and sharing intelligence
- Experience with Information Security in cloudbased environments (Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in both private and public (AWS Azure) environments) and in one or more of the following verticals: network penetration testing application (web mobile) penetration testing Red Team/Purple Team operations application security assessments and network exploitation operations. Candidate should have the ability to perform targeted covert penetration tests with vulnerability identification exploitation and postexploitation activities with no or minimal use of automated tools
- Strong understanding of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or opensource offensive security tools for reconnaissance scanning exploitation and post exploitation (e.g. Cobalt Strike Metasploit Burp Suite); networking fundamentals (all OSI layers protocols); Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) providers in both private and public (AWS Azure) environments; DevOps; incident response; threat hunting; and familiarity with interpreting log output from networking devices operating systems and infrastructure services
Preferred qualifications capabilities and skills
- Intelligence Community/Security Services background relevant certifications such as those offered by Offensive Security (OSCP OSEP OSED OSEE OSCE) CREST (Certified Simulated Attack Specialist Registered Penetration Tester Certified Infrastructure Tester) SANS (GPEN GXPN GWAPT) knowledge of malware packing obfuscation persistence exfiltration techniques and understanding of financial sector or other large security and IT infrastructures
- Technical knowledge or experience developing proof of concept exploits and in house scripting using interpreted languages such as Python Ruby or Perl compiled languages such as C C C# or Java and security tools or technology such as Firewalls IDS/IPS Web Proxies DLP and the ability to articulate and visually present complex penetration testing and Red Team/Purple Team results is highly desirable
- Ability to collaborate with highperforming teams and individuals throughout the firm to accomplish common goals
- Experience with Agile and can work with at least one of the common frameworks is highly desired
Required Experience:
Senior IC