Securing business data

Careers at CNS Group

beebanner

Security Consultant

The ideal candidate would be an experienced IT networking or security professional looking to progress from a senior support and/or junior consultancy position, into a consultancy role. They should have some experience in design, delivery and troubleshooting of multi-vendor network security and security monitoring tools. In addition to this, some exposure in this field, within the context of compliance to standards such as PCI DSS, ISO27001 or HMG IA policy, would be highly desirable.

Understanding of security fundamentals and a passion for security will be essential for the role. Suitable experience and a qualification, such as CCNP/CCDP/CCSP or a CCP, would benefit the candidate. Experience in the creation of technical documentation, such as high and low level designs, including both written word and diagrammatical form, the ability to derive requirements from multiple business stakeholders (from senior managers to engineers) and contribute to customer proposals, is also highly desirable. Some experience in client facing situations would be advantageous.

The candidate should also be SC cleared or be eligible to undertake the process immediately.


Primary Responsibilities:

Working in a team of exceptional individuals, there are boundless opportunities to learn and demonstrate personal abilities. The duties of the role will vary depending on the nature of the project. This can be quite diverse and so being able to attune to the situation is a valuable skill. This also offers the opportunity to express the diversity of skills and explore the individual’s potential.

 

The main responsibility is to provide business advisory and consultative technical services to clients, including provision of technical pre-sales. The areas covered as part of the everyday role may include:

  • supporting the other team members
  • contributing towards technical solutions
  • meeting with clients to determine requirements
  • working with clients to define the scope of a project
  • clarifying a client's system specifications, understanding their work practices and the nature of their business
  • travelling to customer sites
  • liaising with staff at all levels of a client organisation
  • defining software, hardware and network requirements
  • developing agreed solutions and implementing new systems
  • presenting solutions in written reports or oral presentations
  • designing, testing, installing and monitoring new systems and services
  • preparing documentation and schematics
  • keeping knowledge up-to-date with current technologies and topical cybersecurity activities in the industry
  • being involved in pre-sales and support, and where appropriate, maintaining contact with client organisations
  • identifying potential clients and building and maintaining contacts

Specific Responsibilities:

The role specific responsibilities include:

  • The ability to produce high quality work and be able to peer review other team member’s deliverables
  • To be able to mentor up and down the hieratical levels of various teams and positions
  • Delivery of projects within the set time and expected standard
  • Take ownership of issues and escalate where necessary
  • Be able to communicate with clients and other employees at all levels
  • Report to Advisory Managing Consultants
  • Attend occasional internal and external meetings
  • Arrive on-time and personally presentable on client sites
  • Make informed decisions where appropriate
  • Create and submit internal Change Requests

Required Technical Knowledge

The technologies which need understanding, in sufficient detail to discuss in both pre and post sales scenarios, design and delivery of solutions are (in order of preference):

Primary

  • Hands-on Linux system administration (maintenance, scripting and automation)
  • SIEM (AlienVault/OSSIM or any other vendor i.e. LogRhythm)
  • Stateful firewalls (Cisco, Juniper, Checkpoint, Pfsense)
  • Network IPS/IDS (Cisco, Snort, Sourcefire)
  • VPNs (Cisco, Juniper, OpenVPN IPsec and RAVPNs)
  • Routing & Core Switching (Cisco, HP)

    Secondary

  • NAC (ForeScout, Cisco ISE)
  • 2FA (RSA)
  • Host based IDS/IPS (OSSEC, McAfee)
  • AAA (Cisco ACS, Microsoft NPS)
  • PKI (Windows and Linux)
  • Vulnerability Management (Nessus, OpenVAS)

Desired Technical Skills

  • A demonstrable hands-on ability in a discipline other than networking or security e.g. virtualisation, scripting or software development (ideally with associated certification(s) e.g. VCP)
  • A broad understanding of security technologies used in virtualised environments, such as Cisco ASAv/1000V, VMWare vCloud Networking & Security, CheckPoint VE etc.
  • A broad understanding of current market offerings for one or more of IaaS, PaaS, SaaS, VPC/Hybrid Cloud services and the challenges faced with the migration of services to the cloud
  • A broad understanding of storage technologies such as NetApp/EMC VNX, Symetrix
  • Microsoft Windows technologies such as Active Directory, including GPO’s
  • Experience in the hardening of common IT platforms (Windows, Linux, network devices)
  • The ability to interpret the results of penetration tests to identify remediation requirements

Mandatory Non-Technical Skills

  • Strong communication (both written and orally)
  • An attention to detail (but not at the cost of pragmatism)
  • Providing support, oversight, knowledge sharing and assistance to other consultants and from time to time act as 4th line support for the CNS Managed SOC

Desired Additional Qualifications

Exposure or experience in the following is considered highly desirable:

  • HMG IA policy and accreditation process
  • Protective Monitoring (GPG-13)
  • PCI-DSS
  • Delivery of security managed services


 


Please contact info@cnsgroup.co.uk for more information.


For further job opportunities follow us on LinkedIn.

Follow CNS on Linkedin and join our LinkedIn groups
 


SCAWARDS2016_EUROPE_WINNER_Vert

Winner - Best Managed Security Service

FST

Financial Service Technology Awards

Best use of IT in Retail Banking
For implementation of IPT at Duncan Lawrie Bank.
Untitled1

Consulting Practice of the Year

CNS Hut3 have been shortlisted as finalists in the Cyber Security Awards, which seek to recognise talent and achievement within the cyber security industry.
Banking Tech Awards 2012 Logo shortlist

BankingTech Security Initiative of the Year

CNS were shortlisted for their AntiPhishing Security Initiative with Metrobank.