Job Title
Consultant - CyberSecurity and IT Risk Management
About the Role
We are seeking a highly skilled Consultant to join our Infrastructure practice, working closely with Paul. The successful candidate will be responsible for ensuring the security of infrastructure or application technology through the implementation of security services, risk assessments, requirements setting, and active participation in project delivery lifecycle, as well as ensuring adequate processes and procedures.
Your Key Responsibilities
* Define Security Configuration and Operations Standards: Develop and submit security configuration and operations standards for security systems and applications, including policy assessment and compliance tools.
* Develop Baseline Security Configurations: Propose baseline security configurations for operating systems, applications, networking, and communications equipment.
* Perform Technical Security Audits: Conduct technical security audits to ensure the security of infrastructure or application technology.
* Log Analysis and Security Monitoring: Perform log analysis and security monitoring to identify potential security threats.
About You
We imagine our future Consultant to have:
* A minimum of 5 years of relevant experience in IT security.
* An advanced knowledge in security best practices references such as ISO 27001 and OWASP Guidelines.
* The ability to handle security risk management methods and tools, network protocols, and application communications.
* A good knowledge of security technologies, including SIEM, Firewalls, intrusion detection and prevention systems, security information and event management, identity and access management, remote access methods, wireless protocols, and services.
* The ability to work autonomously while being a great team player.
* Fluency in French and English; a good knowledge of Dutch may be an asset for some projects.
Bonus Requirements
* A good knowledge of Advanced Persistent Threat detection, data loss prevention, vulnerability analysis and mitigation, Public Key Infrastructure, communications, and data encryption.
* A good knowledge of backup and disaster recovery methodologies, business continuity planning, and governance.
* Certification in Information Security (CISSP, CISM, CISA, GIAC).