Manager / Sr. Manager Cyber Security  
Phenom Placement Consultants   More jobs from this company

  Email this job
Job Details Back to Job Listing
 
Job Title:   Manager / Sr. Manager Cyber Security
Category:   Networking
Total Positions:   7
Job Location:   Baie-du-Tombeau
Gender:   No Preference
Minimum Education:   Masters
Career Level:   Experienced Professional
Minimum Experience:   8 Years year(s)
Salary Range:   PKR 0 to 0 per Month
Apply By:   Dec 27, 2019
     
     
 
Job Description:

Job Location :Mauritius / Egypt

Profile : Manager / Sr Manager

Exp  : Min 8 yrs+

Accommodation  : Permanent accommodation will not be provided

Roles and Responsibilities :

Business and practice development

·         Building client relationships and establishing credibility by demonstrating knowledge of various aspects of cyber security, and identify opportunities where firm can assist.

·         Supporting senior members of the team in developing client proposals and solution offerings.

·         Managing project financials in line with agreed-upon budgets

·         Driving the development of toolkits, methodologies and accelerators.

·         Providing thought leadership and direction for the cyber security practice.

·         Creating a positive working environment by monitoring and managing workloads of the team â balancing client expectations with the work-life quality of team members; 

·         Providing candid, meaningful feedback in a timely manner to team members; 

·         Keeping leadership and engagement management informed of progress and issues. 

Client service

·         Managing and delivering cyber security and cyber risk assignments, including producing documentation and reports, and quality assuring the work produced by junior team members.

·         Working as a subject matter expert in your particular field to support a team, and/or managing a larger team in delivering engagements at scale.

·         Maintaining awareness of key business and industry trends, and understanding how they impact responses to cyber risk.

·         Design and development of IT Risk and Cyber security programs using industry frameworks and methodologies.

·         Implementation and maintenance of enterprise-wide cyber risk governance frameworks.

·         Assessment of enterprise-wide business risks and cyber threats, design and implementation of cyber risk management controls

·         Championing the delivery of the highest quality services to firm’s clients, and actively managing and mentoring junior team members to do the same, while managing the risks to the firm.

·         - Conduct penetration tests on both business critical infrastructure and applications to support the organizations risk management program.

·         Scope and deliver security testing engagements on time and within budget according to stakeholder requirements and organization needs.

·         Provide quality assurance and technical reviews of deliverables, results and internal documentation (peer review)

·         Evaluate remediation suggestions and provide consultative support with implementation of remediation steps, standards, and best practices where needed.

·         Understand and consider industry trends, customer needs, business risk tolerance, and business environments relating to information security.

·         Understand and clearly communicate potential threats, vulnerabilities, and control techniques.

·         Identify artifact and evidence locations to answer critical questions, including application execution, file access, data theft, external device usage, cloud services, anti-forensics, and detailed system usage

·         Hunt and respond to advanced adversaries such as nation-state actors, organized crime, and hacktivists

·         Extract files from network packet captures and proxy cache files, allowing follow-on malware analysis, or definitive data loss determinations

·         Examine traffic using common network protocols to identify patterns of activity or specific actions that warrant further investigation.

·         Detect and hunt unknown live, dormant, and custom malware in memory across multiple Windows systems in an enterprise environment

·         Identify and track malware beaconing outbound to its command and control (C2) channel via memory forensics, registry analysis, and network connections

·         Target advanced adversary anti-forensics techniques like hidden and time-stomped malware, along with utility-ware used to move in the network and maintain an attacker's presence

·         Use memory analysis, incident response, and threat hunting tools to detect hidden processes, malware, attacker command lines, rootkits, network connections etc

·          Track user and attacker activity second-by-second on the system via in-depth timeline and super-timeline analysis

·         Identify lateral movement and pivots within client enterprises, showing how attackers transition from system to system without detection. 

·         Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environment

Please send your CV with below details if this suits your requirement: 

1. Current Salary 2. Expected Salary  3. Current Employer 4. Current Location 5, Current Location

6. Willing for Mauritius/ egypt-Yes/ no

)


Required Skills:
cyber security,Cyber Consulting,Cyber Risk

Company Information
 
Company Name:  Phenom Placement Consultants
Company Description:


Copyright 2024, Care Foundation. All Rights Reserved