Description:
Contribute to leading-edge security and resilience efforts, advancing protective strategies and propelling continuous improvement.
As an Assessments & Exercises Vice President in Cybersecurity and Technology Controls, you will contribute significantly to enhancing the firm's cybersecurity or resiliency posture by using industry-standard assessment methodologies and techniques to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does) and inform analysis to clearly outline root-causes. In this role, evaluate preventative controls, incident response processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management.
Job responsibilities
Design and execute testing and simulations – such as penetration tests, technical controls assessments, and contribute to the development and refinement of assessment methodologies, tools, and frameworks to ensure alignment with the firm’s strategy and compliance with regulatory requirements Evaluate controls for effectiveness and impact on operational risk, as well as opportunities to automate control evaluation Collaborate closely with cross-functional teams to develop comprehensive assessment reports – including detailed findings, risk assessments, and remediation recommendations – making data-driven decisions that encourage continuous improvement Utilize threat intelligence and security research to stay informed about emerging threats, vulnerabilities, industry best practices, and regulations. Apply this knowledge to enhance the firm's assessment strategy and risk management. Engage with peers and industry groups that share threat intelligence analyticsRequired qualifications, capabilities, and skills
Formal training or certification on software engineering* concepts and 5+ years applied experience in cybersecurity or resiliency Excellent command of Cybersecurity organization practices, operations risk management processes, principles, architectural requirements, engineering and threats and vulnerabilities, including incident response methodologies Ability to analyze vulnerabilities, threats, designs, procedures and architectural design, producing reports and sharing intelligence Experience with Information Security in cloud-based environments (Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) in both private and public (AWS, Azure) environments) and in one or more of the following verticals: network penetration testing, application (web, mobile) penetration testing, Red Team/Purple Team operations, application security assessments, and network exploitation operations. Candidate should have the ability to perform targeted, covert penetration tests with vulnerability identification, exploitation, and post-exploitation activities with no or minimal use of automated tools Strong understanding of the following: Windows/Linux/Unix/Mac operating systems; OS and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance, scanning, exploitation, and post exploitation (e.g. Cobalt Strike, Metasploit, Burp Suite); networking fundamentals (all OSI layers, protocols); Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) providers in both private and public (AWS, Azure) environments; DevOps; incident response; threat hunting; and familiarity with interpreting log output from networking devices, operating systems, and infrastructure servicesPreferred qualifications, capabilities, and skills
Intelligence Community/Security Services background, relevant certifications such as those offered by Offensive Security (OSCP, OSEP, OSED, OSEE, OSCE), CREST (Certified Simulated Attack Specialist, Registered Penetration Tester, Certified Infrastructure Tester), SANS (GPEN, GXPN, GWAPT), knowledge of malware packing, obfuscation, persistence, exfiltration techniques, and understanding of financial sector or other large security and IT infrastructures Technical knowledge or experience developing proof of concept exploits and in house scripting, using interpreted languages such as Python, Ruby, or Perl, compiled languages such as C, C++, C#, or Java, and security tools or technology such as Firewalls, IDS/IPS, Web Proxies, DLP and the ability to articulate and visually present complex penetration testing and Red Team/Purple Team results is highly desirable Ability to collaborate with high-performing teams and individuals throughout the firm to accomplish common goals Experience with Agile and can work with at least one of the common frameworks is highly desired