Senior Security Consultant - Southern California - North OC/LA
hace 4 días
Irvine
Job DescriptionPOSITION SUMMARY This position is recognized as an expert Information Security Consultant and performs remote and/or client consulting projects from a pre-sales and post-sales perspective, in support of Nth Generation Computing, Inc.'s enterprise security practice. This position is responsible for assessing, designing, developing, demonstrating, positioning, provisioning, and implementing enterprise security services and solutions; as well as providing ongoing support to Nth Generation's clients, using the best tools, techniques, and products that our clients demand today. To perform the job successfully, this individual must be able to perform each duty satisfactorily, while always maintaining the Nth Corporate Culture (see Appendix A). This is a Salaried Exempt position. LOCATION & TRAVEL REQUIREMENTS This position will primarily serve our Southern California client base. Travel to Los Angeles County, Riverside County, Orange County, San Diego County, and the surrounding areas is expected based on client and/or business needs. The Senior Security Consultant will also be expected to travel to Nth's Irvine and San Diego offices, according to client and/or business needs. REPORTING STRUCTURE This position reports to Nth's Director, Information Security, who will be the primary manager. This position may also take direction from members of the executive leadership team, as well as the Nth assigned Project Manager, which may vary on each client project. ESSENTIAL DUTIES AND RESPONSIBILITIES, include, but not limited to, the following: Supports Nth's Sales and Presales teams in the role of Senior Security Consultant, adhering to Nth's Sales Process, while always striving to provide top quality solutions and services to Nth's clients. Senior Security Consulting Services: • Executes security gap assessments based on industry frameworks, such as NIST, CIS CSC, and other applicable frameworks., • Performs the role of a Virtual Chief Information Security Officer (vCISO), assessing the organization's security posture, providing a prioritized security remediation roadmap, leading security initiatives, and providing security expertise and expert thought leadership., • Architects enterprise security solutions, based on client needs, that include products/technologies from Nth's security portfolio and respective implementation services., • Performs ethical hacking services to assess clients' security posture, such as internal, external and remote vulnerability and penetration tests, IT security assessments, and other related tactical security services., • Compiles comprehensive written reports directly related to clients' specific risk and business plans., • Provides oral and written post-evaluation reports detailing discussions/conferences with clients to provide remediation suggestions and guidance., • Interviews and evaluates clients to meet and exceed security-assessments, penetration testing and remediation requirements. Strong knowledge, expertise, and formal certifications on Nth's Security portfolio products, such as the following products: (Note: formal training will be made available for some or all of these products to help gain the necessary knowledge and certain required vendor certifications) • Microsoft Windows Certifications, • Arctic Wolf; Atakama; CrowdStrike; Darktrace; Dataminr; Fortinet; Keeper Security; KnowBe4; LogRhythm; Mimecast; NinjaRMM; Palo Alto Networks; CyberArk; Delinea; Varonis; OKTA; Proofpoint/Wombat; Rapid7; Zscaler; F5 Networks; Verkada; Broadcom/VMware Security solutions; Networking (HPE, Aruba, Cisco, Juniper, F5, A10 Networks, VMware SDN/NSX); Containers (Docker, Kubernetes); Converged Infrastructure (HPE, Dell, VMware, Cisco); Cloud Computing solutions (Public, Hybrid and Private Cloud; IaaS, SaaS, PaaS, XaaS, AWS, Azure, GCP, 11:11 Systems, Wasabi); Microsoft Server, AD, Exchange, MSSQL, SharePoint, Office365, Azure, • Other leading Security products and solutions with whom Nth may partner in the future. General Responsibilities: • Completes any needed partner sales and technical certifications, and shadowing engagements, as business needs dictate and as work demands reasonably allow., • Develops a Bill of Materials (BOM) and a detailed Scope of Work (SOW) on properly qualified sales opportunities from interactions with the client and Nth team members. On a daily basis, provides clients and Nth Project Management with up-to-date Daily Status Report documentation of work completed., • Engages in knowledge sharing, which is critical to the team's ability to provide the best value-add for our clients, allows the consultant the ability to give input on new technology and business consulting services and develop the portfolio as a member of the group., • Conducts formal and informal presentations of technical concepts to clients as part of pre- and post- sales support efforts, as needed., • Regularly travels to customer sites, as business requirements dictate., • Able to work during Nth Generation's core hours of operation of Monday through Friday, from 8:00 a.m. to 5:00 p.m. pacific time. Flexible to start early and/or work late based on client needs and workload., • Carries smart phone -with Nth's main communication app installed and functional, such as Teams, and makes best effort to respond to calls/instant messages and emails, both during and after business hours., • Keeps accurate records and notes regarding all client projects, including timekeeping, documentation, project plans, trip reports and status reports., • Performs special projects, as needed., • As business and operational demands dictate, additional duties may be assigned and expected to be performed.TRAINING REQUIREMENTS, • Attends up to two or more weeks of technical training per year, as appropriate., • Attends ongoing training to keep current knowledge base on products we support. Education and / or Experience / Certifications Typically requires: • An advanced degree in Engineering/Cybersecurity or related field, and/or equivalent IT industry training or work experience., • 5+ years of relevant technical experience., • Demonstrated understanding of the NIST Cybersecurity Framework., • Other relevant professional IT/Security certifications a plus, such as:, • Certified Information Systems Security Professional (CISSP), • Global Information Assurance Certification (GIAC), • GIAC Security Essentials (GSEC), • Certified Information Security Manager (CISM), • Certified Information Systems Auditor (CISA), • Certified Ethical Hacker (CEH), • Certified Cloud Security Professional (CCSP), • AWS Certified Security, • AWS Certified Cloud Practitioner, • Computer Hacking Forensic Investigator (CHFI), • Cisco Certified Network Associate (CCNA), • Certified in Risk and Information Systems Control (CRISC), • Must possess the utmost ethical standards and trustworthiness by not sharing privileged passwords, information and/or access to confidential data to other employees or people outside the company., • Excellent written and oral communication skills as demonstrated by:, • Ability to communicate complex technical solutions clearly., • Able to exercise tact and diplomacy in dealing with clients and staff., • Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community., • Ability to effectively present information to top management., • Ability to make public presentations that are technically sound, clearly understood and reach both technical and executive staff., • Ability to have command of the English language and to be recognized as an excellent presenter., • Ability to write speeches and articles for publication that conform to prescribed style and format., • Ability to develop, create and respond to technical Requests for Proposals (RFP's)., • Ability to negotiate and strategize scope-of-work requirements with clients and staff., • Ability to Plan and Project Manage complex technical projects, while maintaining a calm, efficient, competent, well-organized approach with staff., • Ability to learn and retain knowledge of a wide variety of technical information requests and responds quickly to information requests., • Ability to design and create Disaster Recovery and Incident Response Plans., • Ability to apply information from data collection tools and create graphs and charts in Excel for Clients presentations and reports., • Ability to organize and prioritize work assignments, training schedules, and special requests in an unstructured environment., • Ability to maintain a courteous, professional manner with clients and staff at all times and work well under stress., • Ability to interface internally with all departments and externally with outside sales, clients, and partners., • PC literacy to include Office 365, e.g., Outlook, Teams, Word, Excel, Power Point, etc. FileMaker knowledge also a plus., • Consistently projects a friendly, positive, "can do" and helpful attitude., • Is a team player and is self-motivated., • Ability to multi-task and adjust to ever changing requirements. Position requires manual dexterity to perform word processing and computer-related tasks. Able to see, hear and talk. Able to push/pull, sit, walk, stand, bend, keyboard, grasp, hold, participate in repetitive motion with hands and feet. Able to drive an automobile and/or utilize public transportation such as via air, train, or other methods of transportation. WORK ENVIRONMENT The work environment characteristics described here are representative of those an employee encounters while performing the essential function of this job. Reasonable accommodation may be made to enable an otherwise qualified individual with a disability to perform the essential functions. APPENDIX A Nth Corporate Culture • Has a positive "can do" attitude with clients and co-workers. Takes ownership of problems and thinks outside of the box, to find creative solutions, quickly resolve problems and help clients maintain a consistently high degree of uptime., • Works quickly and efficiently to solve problems., • Does not take unnecessary risks when performing tasks. Always operates in a professional and courteous manner. Always strives to be a model citizen and truly believes in the motto "The Customer is Always Right!", • Always goes the extra mile to get the job done completely. Does not cut corners or put off documentation or paperwork and understands that teamwork and sharing knowledge is essential to both the company's and one's own personal success. Cheerfully assists others when asked, even if outside of the job description., • Collaborates well with other employees and client staff. Speaks up when necessary to make sure that proper procedures are followed by all workers and ethical business practices are adhered to at all times., • Projects a positive, friendly attitude, and does not complain to clients, vendors, partners and co-workers., • Contributes to the morale of those around and does not put oneself or another's physical safety in jeopardy. Nth Generation Computing, Inc. is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, veteran status, or genetic information. Nth Generation is committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. To request reasonable accommodation, contact . Job Posted by ApplicantPro