Senior Security Consultant

Posted Aug 29
Secure Ideas in remote
Work At:Full-Time Telecommute (Remote)


###Description and Detail

Secure Ideas is looking to grow our strong, adaptable team with the addition of another Senior Security Consultant. This position calls for an employee with an entrepreneurial spirit, grounded in ethics and respect for others, who is looking to grow long-term along with the development of our company, expanding both his or her individual skill set and promoting the success of Secure Ideas, all the while having fun with the team along the way. Depending on location of hire, this position may be a remote position working from a home office, or may require work from a local office with other members of the team. Travel to client sites is required. This position involves daily interactions with other team members, reports to one of the Principal Security Consultants, and has the potential for upward mobility in a variety of areas based on individual and company achievements.

###Essential Characteristics

A successful candidate will reflect ethical behavior, self-sufficiency, innovative thinking, professional communication (both written and oral), flexibility to assist where needed, respect for others, and a desire to learn and teach others while participating on a bigger team. The ability to communicate with technical, management, and executive level personnel, as well as manage his/her own time effectively, are necessities. Additional qualities reflected in successful Senior Security Consultants are:

  • Self-driven
  • Results-oriented with a positive outlook
  • Clear focus on high-quality work equating in personal and business success
  • Forward planner who can critically assess own performance
  • Mature, credible, and comfortable in dealing with clients’ senior executives
  • Reliable, tolerant, and determined
  • Empathetic communicator (able to see things from the other person's point of view)
  • Well presented and businesslike
  • Sufficiently mobile and flexible to travel up to 50% of the time
  • Interested in new experience, responsibility, and accountability

###Essential Job Responsibilities

  • Perform security consulting services, including but not limited to deep technical pen testing (mobile, physical, web, network, and social), architecture reviews, secure code review, general security consulting
  • Produce high-quality reports and deliverables for clients
  • Conduct field-appropriate research
  • Present at conferences and events
  • Travel (up to 50%)
  • Participate in company-internal projects promoting the growth of Secure Ideas, as well as the art and practice of information security
  • Have a sense of humor about life, work, and self

###Additional Job Responsibilities

  • Promote Secure Ideas through its social media channels. This includes actively writing blogs for the Secure Ideas blog (minimum of 1 per month), Tweeting, Facebook, and LinkedIn.
  • Actively participate in internal calls and communications
  • Maintain customer relationships through regular communication
  • Follow company policies and practices to promote a smooth flow of operations
  • Participate in internal projects, which may include research, development, writing, marketing, back-end support, software development, etc.
  • Be proactive in performing security research and sharing the information with the team and the public

###Essential Knowledge, Skills, and Abilities

  • Understanding modern computer network threats, attacks, and defenses
  • Solid working knowledge of various security-related industry regulations (e.g., HIPAA, PCI, Sarbanes-Oxley)
  • Application, operational, and/or development background
  • Excellent written and verbal communication skills
  • Strong interpersonal skills
  • Ability to work effectively with small teams in a virtual environment
  • Proven ability to succeed in a fast-paced, ever-changing environment
  • Timeliness
  • Adherence to widely accepted IT professional codes of ethics (e.g., GIAC, ISACA, AITP)
  • Ability to multi-task

###Desired Knowledge, Skills, and Abilities

  • Programming in various languages
  • Knowledge of Mac OSX, Windows, and Linux
  • Networking knowledge
  • Specific in-depth tool knowledge with common attack tools (Metasploit, Burp Suite Pro, Kali Linux, nmap, etc)