Primary Purpose of the Role:

The Cyber Security Information Assurance Consultant will provide advice to the design team of resilient systems that operate in secure environments through the identification of risks through analysis of threats to the system, vulnerabilities throughout the user, technology and operating environments and produce acceptable risk treatment solutions in the design or through operational procedures.

Key Responsibilities and Tasks:

  • Support the production of security design documents that have been created through an analysis of the potential risks, which has taken into account threats and likely attack routes to a system, the undesirable security consequences and produces pragmatic security controls and traceable security requirements that will influence the secure solution design.
  • Supporting and guiding the process of taking a system through acceptance and accreditation by the governing risk management group in the customer organisation and produce a supporting security case.
  • Manage Vulnerability Assessments to identify and classify the security vulnerabilities in a system, including contextualisation of the results and management of remediation activities.

Skills and Experience

  • Identification of security risks through identification of vulnerabilities throughout the lifecycle, assessment of exposure, likelihood and severity of the risk in a quantitative or qualitative format that follows an industry recognised risk assessment methodology.
  • Support the secure product/system development following a secure by design methodology or following secure coding principles.
  • Network and endpoint security and hardening using technologies and protocols.

Desirable

  • Support Business Continuity Planning and Management to prevent and recover from potential threats and ensure the smooth running of an organisation or delivery of a service, and provide continuity of critical functions in the event of a disruption.
  • Concepts and technologies that are used to engineer systems which inherently protect users' privacy.
  • Understanding of cyber security solution (tech and process ) testing, exercising, training.

Behavioural Competencies:

  • Manage self as a proactive self-starter
  • Perform through cooperation
  • Influence key stakeholders and engage teams and build relationships
  • Shape solutions out of complexity

Primary Purpose of the Role:

The Cyber Security Information Assurance Consultant will provide advice to the design team of resilient systems that operate in secure environments through the identification of risks through analysis of threats to the system, vulnerabilities throughout the user, technology and operating environments and produce acceptable risk treatment solutions in the design or through operational procedures.

Key Responsibilities and Tasks:

  • Support the production of security design documents that have been created through an analysis of the potential risks, which has taken into account threats and likely attack routes to a system, the undesirable security consequences and produces pragmatic security controls and traceable security requirements that will influence the secure solution design.
  • Supporting and guiding the process of taking a system through acceptance and accreditation by the governing risk management group in the customer organisation and produce a supporting security case.
  • Manage Vulnerability Assessments to identify and classify the security vulnerabilities in a system, including contextualisation of the results and management of remediation activities.

Skills and Experience

  • Identification of security risks through identification of vulnerabilities throughout the lifecycle, assessment of exposure, likelihood and severity of the risk in a quantitative or qualitative format that follows an industry recognised risk assessment methodology.
  • Support the secure product/system development following a secure by design methodology or following secure coding principles.
  • Network and endpoint security and hardening using technologies and protocols.

Desirable

  • Support Business Continuity Planning and Management to prevent and recover from potential threats and ensure the smooth running of an organisation or delivery of a service, and provide continuity of critical functions in the event of a disruption.
  • Concepts and technologies that are used to engineer systems which inherently protect users' privacy.
  • Understanding of cyber security solution (tech and process ) testing, exercising, training.

Behavioural Competencies:

  • Manage self as a proactive self-starter
  • Perform through cooperation
  • Influence key stakeholders and engage teams and build relationships
  • Shape solutions out of complexity

Primary Purpose of the Role:

The Cyber Security Information Assurance Consultant will provide advice to the design team of resilient systems that operate in secure environments through the identification of risks through analysis of threats to the system, vulnerabilities throughout the user, technology and operating environments and produce acceptable risk treatment solutions in the design or through operational procedures.

Key Responsibilities and Tasks:

  • Support the production of security design documents that have been created through an analysis of the potential risks, which has taken into account threats and likely attack routes to a system, the undesirable security consequences and produces pragmatic security controls and traceable security requirements that will influence the secure solution design.
  • Supporting and guiding the process of taking a system through acceptance and accreditation by the governing risk management group in the customer organisation and produce a supporting security case.
  • Manage Vulnerability Assessments to identify and classify the security vulnerabilities in a system, including contextualisation of the results and management of remediation activities.

Skills and Experience

  • Identification of security risks through identification of vulnerabilities throughout the lifecycle, assessment of exposure, likelihood and severity of the risk in a quantitative or qualitative format that follows an industry recognised risk assessment methodology.
  • Support the secure product/system development following a secure by design methodology or following secure coding principles.
  • Network and endpoint security and hardening using technologies and protocols.

Desirable

  • Support Business Continuity Planning and Management to prevent and recover from potential threats and ensure the smooth running of an organisation or delivery of a service, and provide continuity of critical functions in the event of a disruption.
  • Concepts and technologies that are used to engineer systems which inherently protect users' privacy.
  • Understanding of cyber security solution (tech and process ) testing, exercising, training.

Behavioural Competencies:

  • Manage self as a proactive self-starter
  • Perform through cooperation
  • Influence key stakeholders and engage teams and build relationships
  • Shape solutions out of complexity

Jobs You May Be Interested In

IdenITfy provides many opportunities for young graduates as well as experienced professionals for accelerated career growth.

Follow us on Social Media

Hi, how can we help?