Job Description :

DTJP00023867
Data Security Consultant
Duration: 6+ months
Location: 100% Remote

Candidates must be W2 and can work remotely. -- Practical understanding and experience building/designing/operating data protection technologies to include:?Data Loss Prevention, Cloud Access Security Broker, Data Access Governance, Encryption/Tokenization/Obfuscation/Masking, Rights Management, Database Security, Email Security, Endpoint Security, UEBA, Logging & Monitoring -- 10+ years of enterprise exp

Key characteristics:
-- Strong analysis, assessment, analytical and strategic thinking skills
-- Ability to effectively interact with cross-functional teams and leadership
-- Awareness of industry trends in information security governance, data security and privacy as well as the ability to interpret and understand contractual obligations and legal regulations
-- Experience with next-generation information security governance and data security products
-- Excellent written and verbal communication skills
-- Ability to effectively adapt in a constantly changing environment
-- Highly focused on supporting a strong cohesive team and security culture
-- Strong business acumen and forward-thinking
-- High level of integrity and trustworthiness; representing the company and its management team with the highest level of professionalism

Responsibilities:
-- Engages with business partners and other internal stakeholders on cross-functional teams, performing gap analysis against existing access and data security controls for structured and unstructured environments
-- Create and maintain risk register / log of data security gaps and data-centric business process flows
-- Help devise and recommend data security strategy, roadmap and program-related items to the Cybersecurity Data Protection Strategist and with other leaders across the organization, based on results of gap analysis
-- Collaborates with GRC team on the implementation and maturation of security controls against industry-recognized security frameworks and standards such as NIST CSF, NIST 800-53 and ISO 2700x
-- Create documentation and brief leadership on current data security risks as it pertains to enterprise sensitive data
-- Creates and presents business case proposals for investment as needed
-- Ability to identify access and data security gaps in end-to-end business processes and recommend techniques and tools to improve data security posture and prevent data loss

Qualifications:
-- Master’s degree in Computer Science, Cybersecurity, Information Security, Management Information Systems, Information Technology, Engineering, or related field, or equivalent work experience
-- Practical understanding and experience building/designing/operating data protection technologies to include:?Data Loss Prevention, Cloud Access Security Broker, Data Access Governance, Encryption/Tokenization/Obfuscation/Masking, Rights Management, Database Security, Email Security, Endpoint Security, UEBA, Logging & Monitoring
-- 10+ years of enterprise experience in Data Security with working knowledge of Information Governance and Privacy working in a large technology firm with a global footprint
-- Security and privacy industry certifications such as Certified Information Systems Security Professional (CISSP); IAPP CIPT, CIPP/E/US, Fellow of Information Privacy (FIP) preferred
-- Experience with setting strategy for access and data security controls in big data and multi-cloud data environments preferred
-- Strong knowledge of Data Security Control Standards and Procedures

The Cybersecurity Data Security Consultant reports to Dell’s Cybersecurity Enterprise Security Architecture Team, with dotted-line reporting to the Cybersecurity Data Protection Strategist and with responsibility to help modernize the Cybersecurity Data Protection Program. As a data security subject matter expert, this individual will liaise with internal stakeholders and business users, performing a gap analysis of business use cases and existing access and data security controls. The Data Security Consultant is expected to leverage results of the gap analysis to propose enhancements to tools, techniques and processes, influencing the overall data security strategy and roadmap.

             

Similar Jobs you may be interested in ..