Details of the offer for Senior Cybersecurity Consultant M/W about consulting at MY SOURCING in Les Lilas

Company Description
A pioneer of Consulting 4.0, our client is reinventing the consulting business and bringing an innovative perspective and concrete results to its clients, via solutions based on Artificial Intelligence and design to increase the impact of its consulting missions.

Its global presence and expertise in more than 30 sectors and services enable it to support its customers worldwide. Through its "Consulting for Good" approach, they put their expertise at the service of their clients' CSR objectives and make sustainable development a performance lever.

Job Description
You will join the Cybersecurity Business Unit. Thus, and in line with your appetites and choice of expertise, you will be required to work - both in Consulting, Implementation and Audit - on one or more of the following offers:

Cyber ​​Strategy:

Cyber ​​for Boards & Executives; Cyber ​​Target Operating Model; Cyber ​​M&A Due Diligence

Cyber ​​Transformation; Cyber ​​Maturity Assessment & Rating; Cyber ​​Mentoring for Startups

CISOaaS | DPOaaS | BCMaaS | CMaaS

Cyber ​​Risk:

Cyber ​​Risk Management; Cyber ​​Risk Assessment & Treatment; Cyber ​​Risk Quantification

Third-Party Risk Management; Cyber ​​Insider Risk; Cyber ​​Risk Analytics & Reporting

Cyber ​​Risk Review SaaS: C2R

CyberCompliance:

Cyber ​​Compliance Management: ISO 270xx, ISO 27701, ISO 223xx, BS 11200, LPM, NIS Directive, GDPR, SecNumCloud, RGS/PSSIE, SWIFT CSP, DSP2, HDS, PCI DSS, PA DSS, NIST

Cyber ​​Assurance Framework

Data Privacy Assurance

Cyber ​​Operations:

Cloud Security

TO | SCADA | ICS Security; IoT | IIoT | WoT Security

Security Architecture; Security Setup

Infrastructure & Endpoint Protection; Data Protection Technologies

MAI | WFP | AGI | CIAM | DAG

SSDLC | SecDevOps

Cryptography | Encryption

Cyber ​​Resilience:

Threat hunting; Digital Forensics; Incident Response

Vulnerability and Patch Management

Penetration Testing | Red Teaming

Wargaming and Crisis Management

IT Service Continuity Management; Business Continuity Management

Physical Security & Safety

Operational Resilience SaaS: STORM

As part of your operational interventions, and your contributions to the internal development of the firm, you will be able to:

Innovate within the CyberLab, where you work on the development of new SaaS offers and solutions around advanced technologies and capitalizing on unique know-how in AI. You will also carry out benchmarks and PoCs of Cyber ​​solutions on the market, while participating in active monitoring of Cyber ​​news.

Become a Cybersecurity trainer within the Cyber ​​Institute, where you will be involved in the preparation and animation of certifying training sessions as an approved trainer, as well as in the animation of personalized awareness and coaching sessions.

Participate in the influence of the firm, around its Cybersecurity expertise, by actively contributing to the publication plan (articles, insights, white papers, studies, webinar, etc.), and represent the firm at various professional clubs, fairs and events.

Take part in the development of the activity by designing and developing commercial proposals, as well as by identifying new opportunities for collaboration with its customers.

Manage end-to-end projects, or will be responsible for sub-projects of a complex and/or international project, on which you provide relevant, proactive and regular reporting to the attention of the Manager and the Client in order to ensure compliance with its commitments.

Manage the customer relationship on your missions and build a solid relationship with your contacts on the customer side, at middle management level, who recognize you as an expert on the subjects dealt with.

Supervise consultants, Juniors to Confirmed, within the framework of missions, or internal projects, where you will have the role of referent and relay of the Manager / Senior Manager for the follow-up of the sites, the validation of the deliverables, the evaluation of the achievements, and above all you will ensure the development of their soft skills and hard skills.
Qualifications
Graduate of a major engineering school, a major business school or a first-class university. You have at least 3 years of experience with a consulting firm, provider of Cybersecurity and/or Cloud solutions/services, or on the end customer side within a large group.

You have a perfect command of several Cybersecurity standards, norms and benchmarks on the market, in particular ISO 270xx, SANS, NIST, etc. ;

You have actively taken part in successful projects/missions where you have developed solid expertise, at least, around two of its 5 offers mentioned above;

You have excellent interpersonal skills allowing you to be comfortable with different levels of interlocutors, and appreciate teamwork;

You are recognized for your oral and written communication skills combined with a very good sense of formalization;

You are intellectually curious, and develop a pronounced critical and analytical mind, allowing you to quickly understand complex subjects and propose innovative approaches;

You have an entrepreneurial spirit and want to invest in the development of innovative offers and solutions;

You have the ability to work in a team, an open mind, a sense of analysis and you want to join a motivating professional environment where you will share our values ​​of excellence, entrepreneurship, innovation, culture of sharing, benevolence, balance between personal life and professional life;

You want to evolve quickly and take on responsibilities on high-stakes topics within a young and dynamic team;

You have at least two internationally recognized certifications: CISSP, CCSP, SSCP, CSSLP, HCISPP, CISM, C-CISO, CISA, SANS SECXXX, CEH, ISO 27001 LI, ISO 27001 LA, ISO 27005 RM, ISO 22301 LI, ISO 22301 LA, AWS Certified Security, Google Professional Cloud Architect;

You are fluent in French and English (oral and written), given the international dimension of the Firm and its clients.


*an exception will be made for high potential profiles who do not have these certifications. They will integrate the internal Cyber ​​Training program within the Cyber ​​Institute for the preparation and obtaining of Cybersecurity certifications.

Further information
The firm subscribes to the principle of equal access to employment. All aspects of employment, such as hiring, promotions, compensation, or sanctions are based solely on the performance, skills, and behavior of employees or the needs of the business.

Apply