Cybersecurity Advisory Leader at Eide Bailly

Posted in Other 14 days ago.

Location: Minneapolis, Minnesota





Job Description:

About the team




Who We Are



Eide Bailly provides clients across the nation with core tax and audit services as well as expanded Specialty Services, like Technology Consulting. Offering an array of strategic technology services and solutions, our Eide Bailly Technology Consulting team works with our clients to turn business challenges into opportunities. We are a NetSuite global Top 5 Partner and three-time 5-Star Award winner. Our team of 20 NetSuite consultants' diverse industry expertise spans not-for-profits, e-commerce and wholesale distribution. We guide clients through every phase of their NetSuite implementation, from requirements gathering and project planning to system design, data migration, customization, and training and support.


 



Why You'll Love Working Here



At Eide Bailly Technology Consulting our business is about making our clients' businesses better. Our driving force motivating each and every engagement is to understand our clients' needs and to discover the best-fit solutions that will yield valuable results for their business. What makes us different -- and why our clients choose to work with us -- is our proactive, consultative approach to people, process and technology, and our incredible team.


By far, our people make our business, and our culture inspires and attracts the industry's leading talent.


We promote a happy workplace by making work-life balance a daily practice and actively engaging in the communities we serve. Our dedication to service is showcased in our Firm's charitable donation match and focus on encouraging staff to volunteer their time to causes close to them. These are just some of the reasons why we remain an employer of choice for today's top talent.



Job you will do




Typical Day in the Life



As a Cybersecurity Advisory Leader, you willhelp our clients cost effectively transform their current risk and improve, manage and protect their network and applications to meet business demands. You will do this by developing secure on-premise and cloud strategies, processes, operations, support and secure management. You will alsowork directly with clients to prepare, protect, detect, respond and recover along all points of the security lifecycle. With your knowledge across all domains of Cybersecurity, you will develop and execute strategies to strengthen our client's Cybersecurity program and development.


A typical day as a Cybersecurity Advisory Leader may include:

  • Perform assessmentsand deliver action plans and roadmaps for our clients to close their technical and security related gaps
  • Ability to understand and discuss clients business requirements and how they align with different Cybersecurity domains and technologies
  • Architect strategies, programs, and solutions to increase the effectiveness of our clients cybersecurity posture and risk management programs and help them align with industry requirements.
  • Along side our clients, develop strategies and transformation plans that can realistically be implemented and executed to enhance their cybersecurity program.
  • Weigh industry requirements, compliance, and risks against strategies and security solutions.
  • Focus on People, Processes, and Technology as well as a more global view of IT Architecture when executing strategies and roadmaps.
  • Able to communicate technical concepts to non-technical contacts
  • Ability to understand and act as an expert on cybersecurity practices including:
    • Threat and Vulnerability Management
    • Penetration Testing
    • Application Security (SSDLC, Threat Modeling, etc...)
    • Risk Management
    • Incident Response
    • Cybersecurity Budgeting and Finance
  • Act as a vCISO to our clients
  • Acts as Subject Matter Expert and assist other consultants across the Cybersecurity practice.
  • Mentors entire team on advisory related projects
  • Apply advanced subject matter knowledge to complex security and technology issues



Who You Are


  • You have a bachelor's degree in computer science, management information systems, infrastructure security
  • Ideal candidate will have5-7 years working in a similar role focused on advising clients on security posture, security best practices, performing vCISO engagements, and building out cybersecurity strategies.
  • You have prior experience working with and presenting to C Level executives, business owners and stakeholders and are effective engaging in technical discussions with non-technical leaders and briefing senior executives on threats in their current environment and industry
  • Confident in leading project meetings and working as part of a technical team to design, implement and manage security solutions.
  • You are able to build Cybersecurity Policies, Plans, and Procedures from scratch that align with the needs of our clients
  • Work effectively independently and as part of a team.
  • Flexible and able to accommodate changing schedules of client and project needs and willingness to work extended hours when needed.
  • Rigorous attention to detail and strong analytical skills.
  • You have the ability to prioritize work and handle multiple tasks in a fast-paced environment.
  • Your communications are polished and you are able to communicate technical solutions to non-technical clients.
  • Strong knowledge of multiple security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance.
  • Experience with a wide range of security-related topics such as IAM, data protection and governance, encryption, principle of least privilege, zero trust, attack methodologies, incident response, etc.
  • Excellent understanding of IT protocols, technologies such as TCP/IP, OSI model and various other protocols, tools and methods
  • Excellent communication and collaboration with team members, practice areas and clients
  • Understanding of Windows/Linux/Mac operating systems
  • Experience, working knowledge and best practice understanding of:
    • Cloud Technologies and Architectures (Azure\AWS\GCP)
    • M365
    • Vulnerability Scanning Solutions
    • Risk Management Solutions
    • Other Network technologies
  • Deep understanding of Regulatory requirements and compliance related to NIST, ISO 2700x, GLBA, GDPR, HIPAA, PCI, and other security standards and requirements
  • Security and Technical industry certifications a plus (CISSP, CCSP, CISM, CISA, etc..)
  • Obtain additional certifications as needed
  • Travel up to 40% possible
Must be authorized to work in the United States permanently without the requirement of sponsorship at any point in the future.



What to Expect Next



We'll be in touch! If you look like the right fit for our position, one of our recruiters will be reaching out to schedule a phone interview with you to learn more about your career interests and goals.In the meantime, we encourage you to check us out onFacebook,Twitter,Instagram,LinkedInor ourAbout Uspage.


#LI-JK1 #LI-Remote