Risk Advisory – Infrastructure Security – Assistant Manager

  • Full-time

Company Description

Deloitte is a leading global provider of audit and assurance, consulting, financial advisory, risk advisory, tax and related services. Our global network of member firms and related entities in more than 150 countries and territories (collectively, the “Deloitte organisation”) serves four out of five Fortune Global 500® companies. Learn how Deloitte’s approximately 312,000 people make an impact that matters at www.deloitte.com.

About the Division

The value that Deloitte Risk Advisory Africa creates for organisations is synonymous with operational excellence. Our five business areas work in unison to provide integrated solutions unique to the organisational requirements of any business.

In a world that is constantly changing, organisations need to adapt quickly to respond to new risks and take advantage of new opportunities. Deloitte's Risk Advisory practice advises organisations on how to effectively mitigate risk and make informed and intelligent risk decisions around business processes, technology and operations.

Click here to read more about our Risk Advisory practice.

What impact will you make?

Every day, your work will make an impact that matters, while you thrive in a dynamic culture of inclusion, collaboration and high performance. As the undisputed leader in professional services, Deloitte is where you’ll find unrivalled opportunities to succeed and realise your full potential.

Job Description

The main purpose of the job is to support the engagement Manager/Senior Manager in the delivery of services on delegated client engagement/ projects.

Focus on the delivery of client engagements and shares knowledge and experience with others

Able to produce high quality deliverables and support junior team members. 

Specialised Technical Capabilities:

Supports the Development and Implementation on of Cyber Risk Solutions:

·  Ability to develop and execute strategies, architectures, and roadmaps to provide client with need-based, value-adding, and cost-effective Cyber risk solutions

   o  Ability to analyse the client’s cyber security infrastructures to enable targeted and data-driven enhancements

   o  Keeps in mind the client’s business needs when developing assessment frameworks to ensure effective, targeted, and actionable analyses

   o  Applies multiple security testing methodologies and techniques to assess client’s security infrastructures and identify / evaluate vulnerabilities

   o  Gathers data and determines priority criteria to build an integrated roadmap that addresses all facets of an Cyber Assessment or implementation

   o  Assesses cyber security policies and procedures to analyse compliance with regulatory requirements and evaluate overall operational efficiency; provides clients with mitigating solutions

   o  Is proficient with multiple domain-specific cyber security technology solutions and is able to effectively integrate them to meet and exceed client’s needs

   o  Enables sustainability and continuous improvement of cyber security solutions by assessing and enhancing client’s cyber security governance infrastructures

   o  Understands and applies cyber threat intelligence and profiling to the design and assessment of client systems

   o  Tests the effectiveness of client’s cyber security technologies to identify and articulate opportunities for improvement across the digital, physical, and social elements of the client

   o  Conducts complex business process assessments to help clients identify, analyse, and prioritize gaps and risks; applies findings to make recommended upgrades aligned to the overall strategy

   o  Develops effective and sustainable technology and Cyber risk management strategies by tailoring leading Cyber frameworks on key clients’ business and technology needs

   o  Understands the interaction of business and technology processes / risks and can explain it in business terms to both technical and non-technical audiences

Technical competencies:

·  Good understanding of an IP address and how it works

·  Deep knowledge ability to perform:

   o  security reviews of architecture and application designs

   o  mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing

   o  Exploit vulnerabilities to gain access, and expand access to remote systems

   o  Assist with building, hardening, and maintaining systems used for penetration testing

   o  Research cutting edge security topics and new attack vectors

·  Demonstrates Thorough Knowledge And/or Proven Record of Success in Security Technologies Such As Firewalls, IDS/IPS, Endpoint Security Solutions, Access Control Systems, And Other Related Security Technologies

·  In depth understanding of operating systems, network/system architecture, and IT architecture design.

·  In depth understanding of infrastructure and network architecture and design, LAN/WAN implementation, and Windows/Linux environments.

·  Understanding of threats, vulnerabilities, and exploits in different environments and appropriate mitigation techniques.

·  Understanding of relevant Cyber/Information/Cloud security related laws and regulations

Good technical capability and technical certifications in the following areas:

·  An industry leading qualification such as CREST, OSCE, OSCW, Crest, Check

·  CEH (Certified Ethical Hacker)

·  OSCP (Offensive Security Certified Professional

·  GCIH (GIAC Certified Incident Handler)

·  Certified Information Systems Security Professional (CISSP)

·  Information Systems Security Architecture Professional (CISSP-ISSAP)

·  Information Systems Security Engineering Professional (CISSP-ISSEP)

·  Information Systems Security Management Professional (CISSP-ISSMP)

·  OEM product certifications

·  Ability to identify patterns, and analyse and improve processes (business analysis)

·  Software development and engineering including DevSecOps: fundamentals and experience

·  IT System and networks design, build and administration

·  Project Management including Agile Project Management (SAFE Agile, etc.)

·  Microservices, containerisation, server-less/FaaS and DevOps toolsets (CI/CD pipeline)

·  Software Programming/Coding in variety of languages

·  Related Technical fundamentals at that point in time and what the market is procuring

Behavioural Competencies:

·  Excellent communication skills, both written and verbal

·  Effective engagement management

·  Able to deliver engagements on time and within budget

·  Proven ability to make decisions and the right judgement calls

·  Ability to provide leadership and guidance/coaching to junior member of the team

·  Ability to inspire and enthuse others to commitment and involvement taking accountability for larger engagements

·  Manages large engagement / multiple engagement deadlines holistically, identifying risks and escalating. 

·  Able to work under pressure

·  Ownership of deliverables driving team quality and risk management.

Qualifications

Minimum qualifications:

Relevant Degree, Honours or post graduate diploma, professional qualifications e.g. B.Sc, BCom, or B.Ing/Eng or MSc

Desired qualifications:

Advanced certifications, diplomas, professional certifications, advanced degrees in Cyber or information security - examples include:

·  CISM (Certified Information Security Manager)

·  CISSP (Certified Information Systems Security Professional)

·  An industry leading qualification such as CREST, OSCE, OSCW, Crest, Check

·  CEH (Certified Ethical Hacker)

·  OSCP (Offensive Security Certified Professional

·  GCIH (GIAC Certified Incident Handler)

·  Certified Information Systems Security Professional (CISSP) or suitable hands-on experience is required.

Experience:

5+ years of progressive experience with role(s) in a professional, consulting services (including Boutique Security Firm), public and/or private sector organizations is required.

·  Excellent understanding of an IP addressing and how it works (IPv4 and IPv6)

·  Deep knowledge and experience with ability to perform:

   o  security reviews of architecture and application designs

   o  mobile, complex application, infrastructure, as well as social engineering assessments and penetration testing

   o  Exploit vulnerabilities to gain access, and expand access to remote systems

   o  Assist with building, hardening, and maintaining systems used for penetration testing

   o  Research cutting edge security topics and new attack vectors

Additional Information

How you’ll grow

At Deloitte, our professional development plan focuses on helping people at every level of their career to identify and use their strengths to do their best work every day. From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to help build world-class skills in addition to hands-on experience in the global, fast-changing business world. From on-the-job learning experiences to formal development programs at Deloitte University, our professionals have a variety of opportunities to continue to grow throughout their career. Explore Deloitte University, The Leadership Centre. https://deloitte.zoomforth.com/du 

Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. https://www2.deloitte.com/global/en/pages/careers/articles/benefits.html

Our purpose

Deloitte is led by a purpose: to make an impact that matters. Every day, Deloitte people are making a real impact in the places they live and work. We pride ourselves on doing not only what is good for clients, but also what is good for our people and the communities in which we live and work—always striving to be an organization that is held up as a role model of quality, integrity, and positive change. Learn more about Deloitte’s impact on the world. https://www2.deloitte.com/global/en/pages/about-deloitte/articles/impact-that-matters.html

*Please note that this job advertisement provides a summary of the capabilities required and all candidates shortlisted will receive a full list of capabilities.

Privacy Policy