Deloitte & Touche LLP seeks an Advisory Senior Consultant in Dallas, TX.
Work You’ll Do
Identify and evaluate complex business and technology risks, internal controls that mitigate risks, and related opportunities for internal control improvement. Assist in the selection and tailoring of approaches, methods, and tools to support service offerings or industry projects. Use technology-based tools or methodologies to review, design, and/or implement products and services. Construct and assess high-level and detailed security programs translating business needs and regulatory requirements into cost effective and risk appropriate controls. Identify opportunities to improve engagement profitability. Understand clients’ business environment and basic risk management approaches. Develop information security strategies and plans based upon generally accepted security standards. Utilize knowledge of business processes, internal control risk management, IT controls, business and information technology management processes, and market trends on client engagements. Generate innovative ideas and participate in decision making with engagement management. Build and nurture strong client relationships.
#LI-DNI
Requirements
- Bachelor's (or higher) degree in Computer Science, Information Systems, Mathematics, Engineering, Computing Security, or related field (willing to accept foreign education equivalent).
- Eighteen months experience developing, implementing, and architecting information systems.
- Experience must include eighteen months of:
- Analyzing clients regulatory and compliance requirements to build effective controls to address such requirements;
- Installing, configuring, and customizing Okta Identity and Access Management;
- Performing network penetration testing;
- Assessing clients’ Zscaler Internet Access (ZIA) policies on the ZIA portal;
- Implementing Zscaler Private Access (ZPA) and deploying SPLUNK servers on AWS to connect with ZPA;
- Performing manual validation of vulnerabilities using Kali Linux’s terminal tools, including Nmap SSLscan;
- Generating proof-concepts for feasible exploits, identifying false positives, and attaining root access on devices;
- Utilizing automated tools, including Nessus, OpenVAS, and BurpSuite, to scan Internet of Things (IoT) devices and analyzing results;
- Gathering active information by performing port scanning and vulnerability scanning, using Nmap, OpenVas, and Nessus; and
- Performing web application attacks using tools, including XSS, File Inclusion, and SQL injection, and performing password attacks using tools, including Hydra, John the Ripper, and Hashcat.
- Position requires approximately 80% domestic travel.