Senior Consultant / Assistant Manager - Cyber Security

Dubai, AE

Grant Thornton UAE

Grant Thornton is one of the world's largest professional services network of independent accounting and consulting member firms which provide assurance, tax, and advisory services to privately held businesses, public interest entities, and...

View company page

With the rise in cyber breaches across industries, companies are looking for consultants to help them protect their critical assets and proactively prepare and respond to cyber breaches. The threat actors have shifted from simple, nuisance based cyber hacks to criminals, activists, ransom hacks and nation states.

Our teams offer an opportunity for you to leverage your security background and experience to broaden your business and project management skills in a rewarding and challenging environment. You will work on projects across our portfolio of Compliance, Risk Management, Governance, CISO and business continuity services and will assist in the development of Security strategies, Risk Management frameworks, cyber security analytics, cloud security, privacy & data protection, blockchain, etc.

What you’ll be doing:

  • Lead Information Security review and audit projects.
  • Assess compliance and alignment with best practices and propose remediation plans.
  • Perform technical security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
  • Lead Risk Assessment missions.
  • Advise and assist on the Risk Management Framework implementation.
  • Handle observation discussions and workshops with clients.
  • Act as Security Trusted advisor for clients.
  • Perform audits based on various regulatory requirements in and outside the region.

Who we're looking for:

  • 3 - 5 years of related work experience in security in similar consulting practice is preferred.
  • A Bachelor's degree in information security, cyber security, computer sciences, information systems or similar.
  • Industry leading certifications such as CEH, ECSA, CISA, CISM etc. are an asset.
  • Knowledge of industry leading standards such as ISO 27001, NESA, UAE-IA, PCI-DSS, etc.
  • Hands on experience on technical testing and security review of on-premises and cloud infrastructure including Vulnerability Management, WAF configuration, Network Monitoring, Firewall configuration, SIEM, SOC, Microsoft 365.
  • Has hands-on experience in vulnerability assessment and penetration testing, configuration review, security solution implementation effectiveness review and has conducted other complex information security reviews.
  • Strong blue team, red team and endpoint security knowledge.
  • Likes to learn the business of our clients to help them solve problems.
  • Ability to bridge the gap between business strategy and cybersecurity/technology to help deliver sustainable solutions to our clients.
  • Exceptional client service and communication skills, with a demonstrated ability to develop and maintain outstanding client relationships, are expected.
  • Excellent technical skills for building security architecture aligned with the business's requirements.
  • Great communication skills and the ability to present technical jargon in an understandable way.
  • Excellent analytical, organizational, and decision-making skills.
  • A highly logical, honest, and objective nature.
  • Good teamwork and time management skills.
  • Ability to manage multiple engagements and competing priorities in a rapidly growing, fast-paced, interactive, results-based team environment is required.
  • Ability to document testing in a highly detailed and exacting manner is expected.
  • Excellent verbal, written, and presentation skills are required.
  • Excellent computer software skills, including proficiency in Microsoft Office Suite applications, are expected.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Analytics Audits Blockchain Blue team CEH CISA CISM CISO Cloud Compliance ECSA Endpoint security Firewalls Governance ISO 27001 Monitoring Pentesting Privacy Red team Risk assessment Risk management RMF Security assessment SIEM SOC Strategy Vulnerability management

Region: Middle East
Job stats:  20  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.