Cyber Security Consultant

November 16

Apply Now
Logo of Crosslake Technologies

Crosslake Technologies

Private Equity • Merger and Acquisitions • Technical Due Diligence • Commercial Due Diligence • Carve Outs

201 - 500 employees

💸 Finance

Description

• Work with private equity and portfolio company clients to consult on information security strategies. • Assess and address information security risks for customers. • Interact with customer executives to understand desired changes and implement them. • Lead enterprise-wide cybersecurity operations teams and processes. • Manage customer security programs, achieving key compliance initiatives such as SOC, ISO27001, NIST, PCI, and SOX. • Execute identification and recovery activities related to cybersecurity incidents. • Represent the company in cybersecurity forums and working groups. • Evaluate, implement, and secure key systems for customers. • Analyze customer systems for security and risk exposure; prioritize remediation. • Develop and maintain strong security and compliance controls in customer environments. • Collaborate with Operations teams to assess security architectures. • Work with Engineering and Operations teams on implementing new technologies and security solutions.

Requirements

• 15+ years securing organizations as an in-house team member or advisor / consultant in roles like: Chief Information Security Officer, Director / Manager of Information Security, Director / Manager of Compliance, Principal Security Analyst, Principal Security Engineer, Security Architect. • Demonstrated history of being able to successfully implement security controls within an organization. • Experience in leading within a fast-paced, complex organization. • CISSP or equivalent certification is preferred. • Knowledge of legal and regulatory requirements, including the frameworks such as ISO27001, PCI, HIPAA, SOC, SOX, and NIST. • Strong knowledge around the requirements of the above frameworks and implementing security best practices within an organization. • Solid understanding of business management processes, including employing information security risk management and cybersecurity technologies. • Knowledge of application security, cloud security, encryption techniques, identity and access management, mobile security, network security, and virtualization security.

Apply Now
Built by Lior Neu-ner. I'd love to hear your feedback — Get in touch via DM or lior@remoterocketship.com