Are you interested in improving the cyber and organizational risk profiles of leading companies? If your response is yes, consider joining Deloitte & Touche LLP s growing Cyber Risk Data Privacy & Protection practice. Our data protection and privacy architects assist our clients with the design and implementation of holistic and targeted solutions needed to meet and exceed the requirements of best practice, ethical operations, and regulation.
Work you ll do
Assist clients in designing, deploying and managing technology and process solutions to reduce the potential of data compromise
Assist clients with developing technical requirements, evaluating vendor solutions, developing architecture & design, and testing of data protection and data security solutions
Advise clients in understanding the future state problems and challenges in cyber security and work collaboratively with them to enhance capabilities
Contribute to Deloitte s thought leadership in client organizations and external market place
Operate as a technical subject matter specialist
Be up to date on industry trends around cyber risk and data protection practices
Deloitte Advisorys Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions. Learn more about Deloitte Advisory s Cyber Risk Services practice.
4+ years of professional experience within data security and information security, including encryption, access control, cryptographic key management, and PKI life cycle management
In depth knowledge of encryption use cases and hands-on experience establishing an enterprise encryption infrastructure with at least one leading encryption product (such as Vormetric)
In depth knowledge of key and certificate use cases and hands on experience establishing an enterprise key and certificate management infrastructure with at least one leading certificate management product (such as Venafi)
In depth knowledge of Vormetric data encryption products and use cases
Strong understanding of data-at-rest and data-in-transit encryption techniques and methodologies, including database, file, disk encryption, as well as TLS, SSH, etc.
Familiarity with networks, firewalls, IDS/IPS, and end point security
Familiarity with popular databases on both windows and UNIX platforms, including Oracle and MS SQL
Familiarity with common identity, authentication, and directory services, such as Active Directory and LDAP
Familiarity with change management and deployment processes in large IT organizations
Willingness to travel up to 80%; you can be located in any major metro area.
BA/BS in information technology or related field or significant industry work experience
Experience designing and implementing distributed architectures
Demonstrated, hands on experience setting up Hardware Security Module (HSM) appliances, such as Thales or Gemalto HSMs
Hands on experience setting up Public Key Infrastructure (PKI) with one of the leading products, such as Microsoft Active Directory Certificate Services
Hands on experience installing and configuring popular databases on both windows and UNIX platforms, including Oracle and MS SQL
Hands on experience with DevOps and cloud infrastructure security
CISPP or equivalent certification
Launch your career - Upload your resume now!Upload your resume
Loading some great jobs for you...