Previous Job
Previous
Programmer/Developer-Developer / Software Engineer
Ref No.: 18-00853
Location: Dallas, Texas
Start Date: 01/30/2018
Job description:
Capgemini Cybersecurity is looking to strategically engage professionals in the field, at various levels, to support client growth in various 'hub regions', including Chicago, Atlanta, Dallas and NY.

The Cybersecurity Specialist provides security management, operations, consulting and compliance capabilities to our clients. Responsibilities may include:

Security Assurance & Compliance
• Conduct compliance and management audits
• Develop audit plans for allocated audit assignments
• Contribute to contract compliance work
• Decides and reports audit findings
• Suggests corrective actions
• Tracks findings from previous audits through to closure

Security Consulting
• Knowledgeable about the ISMS
• Provide advice and guidance about Security matters to one or more significant accounts or to a large delivery center
• Able to train people up to senior levels in Security and control matters
• Build experience that counts towards certification in Security management, auditing, Identity Access Management
• Participate in solution architecture design; lead security efforts assisting with the integration and initial implementation of IAM solutions
• Serve as the IAM subject matter expert, trusted advisor; provide advisory and consulting services as needed
• Work with stakeholders and vendors to deliver the IAM roadmap in a phased and iterative approach
• Work internally with the various stakeholders to promote the IAM Program, and to understand their requirements, enterprise IT standards and other considerations that influence how IAM solutions and services should perform and consistently operate.

Security engineering
• Ensure people who provide information for Security purposes are made aware of the outcome of its analysis and use Security, Engineering, TDA/Architect, Bids/Solution, Design Builds, designs and executes the analysis and tools required to drive process improvements on discrete projects or accounts
• Able to manage and direct others in the use of techniques to analyze and resolve Security issues

Security Investigation
• Able to perform forensic collections of data and to conduct detailed forensic analysis tasks including data recovery, production of forensic images and compilation of forensic examination reports
• Collection and management of evidence to ensure that the chain of custody is fully documented in accordance with local statutes and policies
• Use of forensic and data mining tools to collect, search, recover, sort and organize large amounts of information in all phases of an investigation
• Conduct interviews to gather additional information in support of investigations verbal presentation skills to work towards Expert Witness status
• Production of high quality written reports presenting complex technical matters clearly and concisely and articulating expert opinions based on analysis

Required Knowledge & Experience
• IT Related undergraduate or graduate degree, or relevant experience in the field in combination with an advanced security certification (see below for a list of accepted certifications)
• Security Policy Framework/Standards
• Audit & Compliance activities
• Forensic analysis
• ISO27001 Implementation
• Vulnerability Management processes and systems
• Application security scanning tools and methodologies
• SIEM tools and processes
• Anti-spam Management processes and systems
• Access Control Management processes and systems
• Encryption techniques - Content Filtering
• Full project delivery life cycles - Delivering client value & service excellence
• Regulatory framework audit experience, or direct knowledge of, the following:
• NIST, ISO 27001/27002, HITECH/HIPAA, PCI, SSAS70

Desired Skills:
• Excellent written and verbal communication
• Excellent analytical & problem solving
• Experience interpreting client needs; assessing full requirements and identifying solutions to nonstandard task queries
• Experience identifying key issues and patterns from partial/conflicting data and coming up with new less obvious solutions to problems
• Prioritizing and managing time to meet agreed to targets
• Communicating difficult issues clearly and establishing consensus and agreement
• Creating information networks with key contacts in area of expertise

Desired Certifications
• CISSP, CISM, CISA, CRISC, GIAC, other advanced security certifications