Senior Associate- Cyber Risk
Listed on 2025-12-11
-
IT/Tech
Cybersecurity, IT Consultant
Job Description
At Eisner Amper, we look for individuals who welcome new ideas, encourage innovation, and are eager to make an impact. Whether you're starting out in your career or taking your next step as a seasoned professional, the Eisner Amper experience is one-of-a-kind. You can design a career you'll love from top to bottom - we give you the tools you need to succeed and the autonomy to reach your goals.
Eisner Amper is looking to hire a Senior Associate to join its Risk & Compliance Services practice as a dedicated member of the IT Risk, Data Privacy & Security team. We're looking for a technically strong professional who can bridge the gap between IT operations and compliance. This role is ideal for someone with hands‑on systems experience who enjoys using their technical knowledge to help clients strengthen security, meet regulatory requirements, and prepare for audits.
Whatit Means to Work for Eisner Amper
You will get to be part of one of the largest and fastest growing accounting and advisory firms in the industry
You will have the flexibility to manage your days in support of our commitment to work/life balance
You will join a culture that has received multiple top "Places to Work" awards
We believe that great work is accomplished when cultures, ideas and experiences come together to create new solutions
We understand that embracing our differences is what unites us as a team and strengthens our foundation
Showing up authentically is how we, both as professionals and a Firm, find inspiration to do our best work
Lead end-to-end delivery of defensive cybersecurity consulting engagements-from scoping to executive read-out-covering Risk & Compliance, Cloud and Application Security, Security Operations, and more.
Assess client Windows Server environments, Active Directory structures, and access controls to identify security and compliance gaps.
Evaluate and provide guidance on Office 365/Azure or AWS configurations, including security, compliance, and identity management settings.
Review network infrastructure (firewalls, VLANs, routing) and interpret configurations for compliance with internal or industry frameworks.
Advise CISOs and senior stakeholders on cybersecurity program maturity and co‑develop strategic roadmaps toward enhanced cyber resilience.
Design actionable remediation plans and oversee their implementation to ensure measurable progress.
Collaborate cross‑functionally to develop innovative service offerings, reusable accelerators, and thought leadership content.
Bachelors Degree
5+ years of experience administering Windows Server environments, with a solid understanding of Active Directory structure and permissions.Familiarity with Office
365/Azure or AWS administration, including security/compliance features.Knowledge of network infrastructure and device configurations, with the ability to interpret firewall rules, VLAN/routing, and other general network configurations.
Exposure to EDR platforms (e.g., Crowd Strike, Sentinel One, Defender for Endpoint)
Ability to perform scripting or automation tasks using languages such as Powershell
Microsoft and/or AWS certification
Strong understanding of foundational security principles such as least privilege, patch hygiene, and secure configuration baselines.
Strong verbal and written communication skills, with the ability to clearly explain technical findings to clients and collaborate effectively with external audit and IT teams.
Experience with Cybersecurity frameworks such as NIST, ISO, CIS, etc.
Eisner Amper is proud to be a merit‑based employer. We do not discriminate on the basis of veteran or disability status or any protected characteristics under federal, state, or local law.
About our Risk & Compliance TeamSpecializing in services such as risk advisory and technology risk, RCS employees aren't just passionate about technology, but we see it as our driving force for innovation and forward thinking. We're committed to serving as advocates to our clients, enabling them to navigate, transform, secure, and maintain processes and controls they need to reach…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).