Sr Cybersecurity Consultant
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, IT Consultant
Job Description
As a Senior Cybersecurity Consultant I, you will engage with commercial customers across a range of industries and provide expert-level cybersecurity services. Using various tools, you will be responsible for helping clients effectively identify and mitigate cyber security threats. Specifically, you will assess a customer's security environment and provide recommendations on how to enhance their security posture in support of short- and long-term objectives.
As a Senior Cybersecurity Consultant I, you will lead customer engagements and assist clients in navigating technically complex and high-profile security concerns. You will test and assess the security posture of a customer’s network, their applications, and devices by emulating offensive techniques that help them defend against threats. As an engagement lead, you will be the technical advocate for information security requirements and possess an in-depth understanding of the information security domain.
You will also articulate and present complex security concepts to business stakeholders and executives and provide recommendations on how best to improve the customer’s security environment.
A Cybersecurity Consultant protects our customers’ hardware, software, and networks from cybercriminals. The consultant’s primary role is to understand our customers’ IT infrastructure in detail, evaluate gaps & threats, and make recommendations to improve the organization’s security posture. The cybersecurity consultant continuously looks for ways to enhance company security and protect sensitive information.
The consultant will work with a team of experts in cybersecurity across the following areas:
- Identity Management strategy development and implementation
- Develop business requirements
- Create solution design
- Development/implementation of solution
- Support Production Go-Live
- Cyber event detection, incident triage, handling, threat intelligence, threat hunting, vulnerability management, security analytics, security automation, and orchestration.
- Work with the security operations teams at Idenhaus customers to coordinate activities and professional communications across a range of stakeholders, internally and externally.
- Develop and deliver briefings, reports, dashboards, and metrics for various levels of management.
- Support NIST assessments for Idenhaus customers (NIST 800-171, NIST 800-53)
- Implementation services for Idenhaus customers
- Delivery assurance, risk identification, and issue management on customer projects
- Earn certifications by learning new skills and tools
- Identify, evaluate, and mitigate cybersecurity risks for clients.
- Provide recommendations for improving the security posture based on assessment findings.
- Design and implement secure network infrastructures and architectures to protect systems, data, and applications.
- Advise on the selection and implementation of security technologies (e.g., firewalls, encryption, intrusion detection systems).
- Lead incident response efforts to investigate security breaches and implement corrective actions.
- Work with clients to develop and improve incident response plans.
- Analyze attack vectors and determine root causes of cybersecurity incidents.
- Ensure that clients meet compliance requirements related to cybersecurity, privacy, and data protection.
- Provide guidance on regulatory frameworks and ensure client organizations adhere to relevant laws and standards.
- Perform vulnerability assessments to identify security weaknesses in clients' networks and systems.
- Recommend and support the implementation of remediation strategies to mitigate vulnerabilities.
- Work closely with clients to understand their security needs and design tailored solutions.
- Provide expert advice and guidance on security technologies and tools.
- Act as a subject matter expert for cybersecurity-related issues and stay updated on emerging trends and threats.
- Monitor and analyze security alerts and events from various sources (e.g.,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).