Consulting - Security & Privacy - Senior Associate

In order to address the most critical needs of our clients, RSM US LLP has established the Security, Privacy and Risk group, comprised of more than 100 professionals dedicated exclusively to serving the cyber security needs of our clients. This group includes experienced consultants located throughout the country dedicated to helping clients with preventing, detecting, and responding to security threats that may affect their critical systems and data. We serve a diverse client base within a variety of industries, and we are relied upon to provide expertise within areas of security testing, architecture, governance, compliance, and digital forensics.We are seeking individuals with a variety of skill sets such as performing vulnerability assessments, penetration testing, incident response, governance assessments (HIPAA, NIST, ISO, FISMA, etc.), Payment Card Industry (PCI) assessments, as well as experience in managing or deploying SIEM, DLP, and Identify Management solutions.? ?Responsibilities will be based on background but will typically include: Perform vulnerability assessments and penetration testing to verify the strengths and weaknesses of a variety of operating systems, network devices, web applications, and security architectures utilizing commercial and open source security testing tools Perform assessments against a variety of regulatory and industry standards such as PCI, FFIEC, ISO 2700X, NIST sp800 series, FISMA, FedRAMP, HIPAA/HITECH, and NERC/CIP Assist clients in improving the capabilities and maturity of their monitoring program by identifying appropriate technologies, policies, organizational structures, and relations with third parties Assist with the development and delivery of remediation recommendations for identified findings Identify and clearly articulate (written and verbal) findings to senior management and clients Help identify improvement opportunities for assigned clients Required qualifications:This position is for individuals with 2-6 years of experience within the cyber security space, with a preference for prior consulting or professional services backgrounds. Other candidates may be considered based on experience and skill sets. Bachelor's degree in computer science or related field from an accredited college/universityAbility to travel as needed Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices Strong verbal and written abilities Strong multitasking and project management skillsPreferred qualifications that may vary by candidate:Experience with testing and development frameworks such as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Experience with discovering and demonstrating web application vulnerabilities such as Cross Site Scripting (XSS), Cross Site Request Forgery (CSRF), Injection Flaws, Remote file inclusion (RFI) and SQL Injection Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box) In-depth knowledge of the security and privacy provisions of a variety of regulations and standards such as PCI, NERC/CIP, HIPAA/HITECH/HITRUST, FFIEC, FDIC, ISO 27000 series, NIST sp800 series, etc. Commercial Application Security tools experience (Nessus , Nexpose, Qualys, Appdetective, Appscan, etc.) Open source and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.) One or more of the following technical certifications or similar: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); GIAC Web Application Security (GWAS); Offensive Security Certified Professional (OSCP); GIAC Certified Incident Handler (GCIH); GIAC Reverse Engineering Malware (GREM); PCI Qualified Security Assessor (PCI-QSA); etc. One or more of the following governance certifications: Certified Information Systems Security Professionals? (CISSP?); Certified Information Systems Auditor? (CISA?); Certified Information Security Manager? (CISM?) - provided by Dice


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.