Job was saved successfully.
Job was removed from Saved Jobs.

Job Details


Deloitte

Cyber Protection (Encryption) Specialist Senior

Equipment/Technology Specialist

Equipment and Facilities Specialist

No

Costa Mesa, California, United States

Are you interested in improving the cyber and organizational risk profiles of leading companies? If your response is yes, consider joining Deloitte & Touche LLP's growing Cyber Risk Data Privacy & Protection practice. Our data protection and privacy architects assist our clients with the design and implementation of holistic and targeted solutions needed to meet and exceed the requirements of leading practice, regulation, risk reduction and effective operations.

Work you'll do

• Assist clients in identifying, designing, deploying and managing technology and process solutions to reduce the potential of data compromise

• Assist clients with developing technical requirements, evaluating vendor solutions, architecture/design and engineering/integration/testing of data protection and data security solutions • Advise clients in understanding the future state problems and challenges in cyber security and work collaboratively with them to enhance capabilities

• Contribute to Deloitte's thought leadership in client organizations and external market place

• Operate as a technical subject matter specialist

• Stay up to date on industry trends around cyber risk and data protection practices The team Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks. Our professionals provide advisory and implementation services that integrate risk, regulatory, and technology skills to help clients transform their legacy programs into proactive Secure.Vigilant.Resilient.TM cyber risk programs. Join the team developing the future state of cyber risk solutions. [1] Learn more about Deloitte Advisory's Cyber Risk Services practice.

Qualifications Required:

• 3+ years of professional experience within data security and information security, including encryption, certificate lifecycle management, PKI implementation, access control, cryptographic key management

• In depth knowledge of encryption use cases and hands-on experience establishing an enterprise encryption infrastructure with at least one leading encryption product (e.g., Thales Vormetric, Fortanix, Protegrity)

• In depth knowledge of public key infrastructure (PKI), certificate management use cases and hands on experience establishing an enterprise certificate management infrastructure with at least one leading certificate management product (e.g., Venafi)

• In depth knowledge of encryption and key management services/use cases and hands on experience of configurations with at least one public cloud (e.g., AWS, Azure, GCP)

• Strong understanding of data-at-rest and data-in-transit encryption implementation methods, including database, application tokenization, masking, TLS and SSH

• Familiarity with API integration methods (e.g., PowerShell, JSON)

• Familiarity with networks, firewalls, IDS/IPS, and end point security

• Familiarity with popular databases on both windows and UNIX platforms, including Oracle and MS SQL

• Familiarity with common identity, authentication, and directory services, such as Active Directory and LDAP

• Familiarity with change management, deployment and operational processes in large IT organizations

• Ability to travel up to 50% (While up to 50% travel is a requirement of the role, due to COVID-19, non-essential travel has been suspended until further notice.)

• BA/BS in information technology or related field or significant industry work experience Preferred:

• Experience designing and implementing distributed architectures

• Demonstrated, hands on experience setting up Hardware Security Module (HSM) appliances, such as Thales, Gemalto or nCipher HSMs

• Hands on experience setting up Public Key Infrastructure (PKI) with one of the leading products, such as Microsoft Active Directory Certificate Services

• Hands on experience installing and configuring popular databases on Windows and UNIX platforms, including Oracle and MS SQL

• Hands on experience with DevOps and cloud infrastructure security

• Knowledge of secrets management and orchestration approaches (e.g., dynamic secrets generation and rotation)

• Knowledge of quantum computing, homomorphic encryption or multiparty computing concepts

• CISSP or equivalent certification

References Visible links 1. http://www2.deloitte.com/us/en/pages/risk/solutions/cyber-risk-services.html