Cyber Security Consultant

Chicago, Illinois

Applications have closed

AHEAD

AHEAD builds digital platforms to deliver better outcomes faster and create a significant and sustainable business impact for our clients.

View company page

AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation.
AHEAD is committed to a community of diversity, equity, and inclusion. We encourage applications from women, underrepresented minorities, persons with disabilities, sexual minority groups, and all other candidates who will contribute to the diversification and enrichment of ideas and perspectives here at AHEAD.
We are on this journey to ensure that all AHEADians feel that they can authentically show up and belong at work.
Cyber Security Consultant(Also known as a Security Architect)
We are looking for a Security Architect to join the Ahead family. The Security Architect position is responsible for representing and leading the delivery of strategic security service offerings. AHEAD is driven by industry-leading experts who have developed a consultative framework based on an agile approach to deliver value to the client at regular intervals. It provides a vendor neutral consultative view to clients looking to transform their IT environments using next-generation security technologies that can propel the security of posture of a client forward and be an enabler of innovation for the client.
The Security Architect leads customer-facing projects. He or she will lead all aspects of the development of security project deliverables including assessment, solution development and implementation efforts. He or she will effectively and accurately scope customer facing projects and identify and positions follow-on work at customers and with stakeholders that extends the value of Ahead as a strategic partner to the client. The Security Architect can individually solve problems of higher complexity and assist and guide more junior resources through their problem resolutions. The Security Architect will also participate in the development and enhancement of the information security solutions portfolio to insure it maintains relevancy with customer requirements and industry changes. The position requires a team player that seeks to supplement their skills through the use of project experience, self-study, and ongoing training.

Roles and Responsibilities

  • Lead technical project teams in the delivery of security service offerings
  • Serve as the security technical expert on project engagements advising clients on best practices, design standards, procedures to keep their systems safe and data secure, while considering overall manageability of the solution
  • Ensure that customer expectations are appropriately set and managed
  • Facilitate strategy, roadmap, design, and planning workshops that are focused on achieving the security and risk profile of the client
  • Drive and manage the objectives, requirements gathering, project tasks/milestone, project status, dependencies, and timelines, to ensure engagements are delivered successfully and on time while meeting the business objectives
  • Final editing and sign off on project deliverables
  • Presentation of deliverables to client executive management
  • Security thought leader and evangelist
  • Maintain a broad knowledge and understanding of the current and anticipated future state of the information security marketplace including trends, technologies, and standards
  • Develop and promote relationships with our clients
  • Participate and enhance AHEAD security solution portfolio, including consulting offerings and deployment services
  • Represent service offerings during the sales cycle, including project scoping, proposal development, and presenting proposals to clients
  • Approximate time allocation of security principal consultants:
  • 50%-60% - Coordinating and developing client deliverables
  • 20%-25% - Meeting with prospects, writing and presenting statements of work deliver of proposals, and other marketing activities (speaking at conferences, blog writing, etc.)
  • 10%-15% - Facilitating client workshops leading guided discovery and presentations
  • 10%-15% - Developing new service offerings and enhancing existing offerings

Skills

  • Ability to identify weaknesses and potential threats to existing information security strategy encompassing of people, process and technologies and provide security and process recommendations to close any gaps.
  • Strong interpersonal skills, customer centric attitude, ability to deal with cultural diversity
  • Meeting facilitation and consensus building skills are required.
  • Excellent written and verbal communication skills are required.

Technical Skills Focused on One or More of the Following Areas

  • Common programming languages including, C, C++, C#, Java, SQL or PHP
  • Windows, UNIX and Linux operating systems
  • Encryption technologies, ethical hacking and penetration testing
  • Endpoint Security Tools
  • Multi-factor authentication, single sign-on, identity management or related technologies
  • Network administration skills to test internal systems such as firewalls and IPS/IDS devices
  • Public key infrastructures (PKIs), including use of certification authorities (CAs) and digital signatures as well as security standards for the application development life cycle
  • Security Information and Event Management (SIEM) implementation and strategy
  • Familiarity with public cloud offerings from AWS and or Azure and a strong understanding of how to secure workloads in those environments

Qualifications

  • 15+ years of experience in related areas including 5+ years of experience in developing and implementing security projects for medium to large organizations
  • One or more of the following security certifications is preferred:
  • Certified Information Systems Security Professional (CISSP)
  • GIAC Information Security Professional
  • Systems Security Certified Practitioner (SSCP)
  • Offensive Security Certified Professional (OSCP)
  • Certified Information Security Manager certification (CISM)
  • Certified Information Systems Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Certified in the Governance of Enterprise IT (CGEIT)
  • Certified in Risks and Information Systems Control (CRISC)
  • Qualification in Internal Audit Leadership (QIAL)
  • ISO27001 (auditor or implementer)
  • Qualified Security Assessor (QSA)
  • Familiarity with in key legislations such as the Health Insurance Portability & Accountability Act (HIPAA), The Sarbanes-Oxley (SOX) Act of 2002, Payment Card Industry (PCI), The National Institute of Standards and Technology (NIST), The Gramm-Leach Bliley Act (GLBA), General Data Protection Regulation (GDPR), The Federal Risk and Authorization Management Program (FedRAMP).
  • Familiarity with in key industry recognized security frameworks such as ISO 27001-2 and COBIT, Center for Internet Security (CIS) controls, or OWASP.
  • Proven team player and team builder
Why AHEAD:
Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between.
We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning.
We understand that you have a life outside of work. That’s why we offer flexible paid time off, paid company holidays, and the ability for you to manage your work schedule as needed.

Tags: Agile Analytics Automation AWS Azure C CISA CISM CISSP Cloud COBIT CRISC Encryption Endpoint security Ethical hacking FedRAMP Firewalls GDPR GIAC Governance HIPAA IDS IPS ISO 27001 Java Linux NIST Offensive security OSCP OWASP Pentesting PHP Security strategy SIEM SQL SSCP Strategy UNIX Windows

Perks/benefits: Career development Conferences Flex hours Flex vacation Team events

Region: North America
Country: United States
Job stats:  10  1  0
Category: Consulting Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.