17 Oct. 2020

๐–๐ž'๐ซ๐ž ๐ก๐ข๐ซ๐ข๐ง๐  ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐‘๐ž๐œ๐ซ๐ฎ๐ข๐ญ๐ฆ๐ž๐ง๐ญ ๐‚๐จ๐ง๐ฌ๐ฎ๐ฅ๐ญ๐š๐ง๐ญ ๐Ÿ๐จ๐ซ ๐จ๐ฎ๐ซ ๐œ๐จ๐ฆ๐ฉ๐š๐ง๐ฒ.

Vacancy:

2


๐‰๐จ๐› ๐‚๐จ๐ง๐ญ๐ž๐ฑ๐ญ:

As a cyber security consultant you will provide advisory and technical expertise to help our clients design and deploy state of the art cyber security practices and operating models. You will provide subject matter expertise and work collaboratively with our clients to advise, design, build and implement pragmatic cyber security solutions.


๐‰๐จ๐› ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ข๐›๐ข๐ฅ๐ข๐ญ๐ข๐ž๐ฌ

Working with global organizations and the related complexity of their cyber security requirements.

Working in a multi-disciplined team of Strategy, Digital and Technology professionals to bring the best of Accenture to our clients.

Customizing Accenture's knowledge assets to support designs that are appropriate for each client. Designing a pragmatic but effective cyber security defense for our clients.

Perform current state assessments of our clientโ€™s cyber security posture, including benchmarking/maturity assessments, developing strategies and roadmaps for improvement.


๐„๐ฆ๐ฉ๐ฅ๐จ๐ฒ๐ฆ๐ž๐ง๐ญ ๐’๐ญ๐š๐ญ๐ฎ๐ฌ:

Contractual


๐‰๐จ๐› T๐ฒ๐ฉ๐ž:

Full time


๐„๐๐ฎ๐œ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐๐ฎ๐š๐ฅ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง๐ฌ:

B.Sc / Diploma in Computer Science & Engineering from any reputed institution.

Bachelor degree in any discipline.


๐„๐ฑ๐ฉ๐ž๐ซ๐ข๐ž๐ง๐œ๐ž ๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ:

3 to 6 year(s)


๐‰๐จ๐› ๐‘๐ž๐ช๐ฎ๐ข๐ซ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ:

  1. 2+ years of hands on experience in security incident and event management, threat hunting, penetration testing or securing software development lifecycles (SDLC).
  2. Relevant certifications such as CISSP, CISM, or SABSA are a plus.
  3. Must be an expert with Flash and/or Swish.
  4. Knowledge of Penetration testing.
  5. Knowledge of Firewall safety and management.
  6. Knowledge of advanced persistent threat management.
  7. Programming languages used for the storage and processing of raw data.
  8. Familiarity with various operating systems.
  9. Principles of ethical hacking and coding practices.