Required Skills :
Cybersecurity Architecture & Solutions, Technical Proficiency, Compliance & Regulatory Knowledge, Consulting & Communication Skills, Project & Business Acumen
Work Mode : HYBRID
Working Day : 5
Mandatory Criteria (Can't be neglected during screening) :
- Need candidate having Fluent Japanese language proficiency.
- Certifications required by the candidate - (Either from given two) - ISO 27001 or CISSP
- Candidate should have experience in Security architecture & Consulting
- Candidate should have Strong expertise in networking, operating systems (Windows / UNIX / mainframe), firewalls, IDS / IPS
- Candidate should have Knowledge of scripting / programming languages (C, Java, Perl, Shell)
- Candidate should have Hands-on experience in vulnerability assessments, incident response, policy creation, governance
- Candidate should have Strong understanding of regulatory frameworks (PCI DSS, GLBA, Basel II, EU Data Protection, US State Privacy Laws)
- Candidate should have Excellent client-facing and stakeholder management skills
- Candidate should have Ability to mentor, lead projects, and work in diverse teams
- Candidate should be Willing to travel as per business / project requirements
Job Description :
Who we are looking for :
A Senior consultant with proven technical and consultative experience, fluent Japanese language proficiency, and expected to be strong in both technical and interpersonal skills. A Senior Consultant must be a proven self-starter with the ability to problem-solve, communicate, participate in diverse project teams from a technical perspective, and interface effectively with customers, vendor partners, and colleagues.
You will actively contribute to improving operational efficiency on projects and internal initiatives. Deliver timely engagements and work closely with Practice Directors to drive training and education, career development, performance development, and collaboration across the team. In line with Optivs commitment to quality, you will confirm that work is of the highest quality as per quality standards, by reviewing the work provided by other members.
How youll make an impact :
Comfortably deliver solo-based work or act as "point" for complex projectsActs as technical escalation point to assist other consultantsLead in creation, development and delivery of custom security solutionsLead security and compliance program-related development and implementation effortsDesign, implement and educate on specific security processesEffectively provide knowledge transfer and post-engagement support activities as necessaryExcellent team communicatorMentor less experienced consultantsMaintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional associations such as ISACA, ISC2 etc.Consistently complete administrative project tasks like time and expense entry, status reporting, and project completion reportingSupport and occasionally lead practice related development efforts including training and awareness, performance development and cyber strategy acceleratorsAct as contributor in Optiv communities for solutions of focus.Qualifications :
Bachelor's degree and related work experienceProven security architecture experienceStrong knowledge of multiple security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governanceStrong understanding of networking (TCP / IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS / IPS, etc.) and application programming / scripting languages (C, Java, Perl, Shell)Strong understanding of regulatory requirements and compliance issues affecting clients related to privacy and data protection, such as PCI DSS, GLBA, Basel II, EU Data Protection Directive, International Cross Border, and U.S. State Data Privacy LawsExpert knowledge of using Microsoft OfficeAbility to build relationships with and influence other functional areasWell-developed negotiation skillsAbility to build consensusSolid business acumen and basic project management expertise.Ability to manage multiple tasks in parallelWillingness to travel to meet client needs.Good-to-Have Criteria :
Professional certifications such as CISSP, CISM, CISA, CEH, or equivalentExposure to cloud security platforms (AWS, Azure, GCP)Experience in data privacy & cross-border compliance projectsAdvanced skills in automation, scripting, or security orchestrationPrevious consulting experience with global clientsParticipation in professional associations (ISACA, ISC2, etc.)(ELIGIBLE CANDIDATED WILL BE SENT AN APPLICATION LINK FOR APPLICATION, HENCE PLEASE DO KEEP CHECKING INBOX HERE AT LEAST FOR 7 DAYS AFTER APPLICATION)
(ref : hirist.tech)