Acme Services
Acme Services45d ago
Foundit

Cyber Security Consultant

Mumbai

Auto Apply to 50+ AI Matched Cyber Security Consultant Jobs

Use Auto Apply Agents to Bulk Apply jobs with ATS Optimised Resumes, find verified Insider Connections for jobs at Acme Services

Full Job Description

Cyber Security Consultant - Acme Services, Mumbai

Acme Services is seeking a skilled Cyber Security Consultant in Mumbai to bolster our security posture. This role involves in-depth analysis, strategic implementation, and proactive defense against evolving cyber threats.

Key Responsibilities:

  • Threat & Risk Analysis: Conduct comprehensive assessments of business impact from new and existing systems, focusing on eliminating risk and performance issues.
  • Vulnerability Management: Implement vulnerability assessments and configure audits for operating systems, web servers, and databases. Detect patterns, insecure features, and malicious activities.
  • Security Technology Evaluation & Deployment: Research, test, evaluate, and deploy cutting-edge security technologies and procedures.
  • Breach Detection & Diagnostics: Run diagnostics on data changes to verify breaches and continuously monitor for unusual activities.
  • Custom Security System Development: Develop specialized security features and procedures for software systems, networks, data centers, and hardware.
  • Security Standards & Procedures: Develop and implement robust information security standards, guidelines, and procedures. Maintain documentation for security guidelines, procedures, standards, and controls.
  • Network Security: Develop and configure firewalls to secure network infrastructure.
  • Threat Intelligence & Protection: Stay current with new intrusion methods and develop proactive protection plans. Understand vulnerabilities, management systems, and common security applications.
  • Incident Response & Reporting: Execute counteractive protocols and report security incidents. Provide customized risk ratings for vulnerabilities based on company policies. Implement defensive protocols during breaches.
  • Security Tool Proficiency: Demonstrate in-depth understanding of OWASP testing methodology, SAST/DAST, re-engineering, automation, ASP.NET/JAVA, IDS/IPS, Burp Suite, Nmap, Nessus, Qualys, and Metasploit.
  • Client & Service Provider Coordination: Manage relationships and coordinate with clients and service providers. Offer security assessments, implement policies, design training materials, organize sessions, provide technical support, and communicate security policies.
  • Data Protection: Design broad defenses against intruders to protect client data, especially sensitive information, from internal and external threats.
  • Proactive & Defensive Systems Development: Collaborate with the cybersecurity team to develop new protocols, layers of protection, and both proactive and defensive systems.
  • Security Monitoring & Reporting: Constantly monitor for attacks, run defensive protocols during breaches, collect data for risk analysis, and write systems-status reports.
  • Vulnerability Testing & Remediation: Conduct vulnerability testing, identify weaknesses, and collaborate on updating defensive protocols.
  • System Configuration: Configure anti-virus systems, firewalls, data centers, and software updates with a security-first approach.
  • Access Management: Grant credentials, monitor access activities, and check for unregistered information changes.
  • Security Awareness Training: Assist in leading employee training against phishing and other cyberattacks.
  • Stakeholder Interface: Coordinate and interface with stakeholders, managing communications for timely updates and progress reports.
  • Documentation & Confidentiality: Prepare corporate documents and maintain organized filing systems. Uphold strict confidentiality and professionalism.
  • Compliance Monitoring: Ensure monitoring compliance with applicable privacy laws.
  • Thought Leadership & Advisory: Conduct research and prepare client presentations, information memorandums, and thought leadership documents. Contribute to advisory engagements.

Required Skills:

  • Strong IT knowledge (hardware, software, networks).
  • Meticulous attention to detail and multitasking abilities in a fast-paced environment.
  • Strong critical thinking, problem-solving, logic, and forensics skills.
  • Ability to work both individually and in a team.
  • Ability to think like a hacker.
  • Excellent verbal and written communication skills.
  • Passion for delivering quality work.
  • Strong planning and organizing skills.
  • Commitment to self-development and supporting others.
  • Cooperative and influential team player.
  • Clear, concise, confident, and purposeful communication.
  • Knowledge of regex and parser creation.

Good to Have:

  • Master's degree.
  • Certifications (CEH/CISSP/CCNA, etc.).