Job Details
Cyber Data Protection and PKI Specialist - Senior Consultant
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
The Team
Our Cyber Strategy & Transformation offering develops and transforms cyber programs in line with a client's strategic objectives, regulatory requirements, and risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes design of the cyber organization, governance, and risk assessments.
Work You'll Do
Qualifications
Required:
Preferred:
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $118,700 - 218,600.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Watch this video to learn more about Deloitte LLP
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
The Team
Our Cyber Strategy & Transformation offering develops and transforms cyber programs in line with a client's strategic objectives, regulatory requirements, and risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes design of the cyber organization, governance, and risk assessments.
Work You'll Do
- Serve as a subject matter expert and trusted advisor to our clients, assisting them to evaluate strategic and practical data protection and encryption requirements based on new and emerging data risks, advising on best practices for data encryption, decryption, and secure key management
- Assist clients in designing, implementing and operating technology and process solutions to reduce data risks, developing and leading the implementation of encryption strategies to protect sensitive data across various environments, including cloud, on-premises, and hybrid infrastructures, to manage the deployment and lifecycle of PKI systems, ensuring robust and scalable certificate management processes, monitor and maintain the health of certificate infrastructures to prevent downtime and security breaches, and assist with developing requirements, evaluating vendor solutions, architecting, implementing and operating data protection solutions
- Aid in the delivery of client engagements, ensuring success by:
- Driving day-to-day execution, communicating updates to clients and firm leadership
- Providing leadership and support to delivery teams to ensure completion and accuracy of high-quality work products
- Tracking and reporting on project timelines to ensure on time and on budget delivery
- Stay up to date on emerging encryption technologies (e.g., post-quantum cryptography, confidential computing, secure enclaves, envelope encryption) and industry trends around cyber risk, data protection and cryptography practices.
- Proactively evaluate and recommend new tools and solutions to enhance data security
Qualifications
Required:
- Bachelor's degree in Cybersecurity, Information Security, Engineering, Computer Science, Information Technology or related field
- 5+ years of professional experience within data protection and information security, which may include Data Discovery, Data Classification and Rights Management, Data Access Governance, Data Loss Prevention, Cloud Access Security Broker, Encryption, Certificate Lifecycle Management, Cloud Security, SaaS Security
- 5+ years with PKI concepts: certificates, CAs, RA, CSR, OCSP, CRL, HSM, key management, trust chains
- 2+ years of professional experience managing and implementing various encryption technologies (e.g., database encryption, file encryption, Public Key Infrastructure (PKI), certificate lifecycle management (CLM), transport layer security (TLS)) and strong understanding of Cloud encryption concepts such as client-side encryption, bring your own key (BYOK), server-side encryption.
- 2+ years of professional experience developing data protection strategies, roadmaps and frameworks; experience may include designing, implementing and operating data protections services
- 2+ years of total hands-on technical experience with one or more data protection technologies
- 2+ years with CLM platforms such as AppViewX, Venafi, Keyfactor, DigiCert, or similar
- 2+ years with cryptographic standards and protocols including TLS/SSL, SSH, S/MIME, code signing, and NIST-aligned practices
- 2+ years certificate discovery, inventory, automation, renewal, and compliance monitoring
- 2+ years supporting strategy, architecture, roadmap, and implementation workstreams
- 2+ years of hands-on understanding of integration points across F5, load balancers, WAFs, Kubernetes, API gateways, web/app servers, and cloud platforms
- 2+ years of client-facing skills: requirements gathering, stakeholder management, workshop facilitation, and executive communication
- 2+ years leading small teams/workstreams and producing structured, client-ready deliverables
- Ability to travel 25-50%, on average, based on the work you do and the clients and industries/sectors you serve
- Limited sponsorship may be available
Preferred:
- Quantum readiness and AI protection experience a strong plus
- Significant industry work experience preferred
- Experience with market leading data protection and encryption vendors (e.g., Thales, AppViewX, Venafi, Fortanix, DigiCert, Protegrity)
- Experience with public cloud (Azure, AWS, GCP) security and modern data platforms (e.g., Snowflake, Databricks, Starburst)
- Experience or familiarity with emerging data protection technologies for user communications, e.g., Secure Access Service Edge, Data Security Posture Management, Data Security Platforms and Synthetic Data
- Familiarity with networks, firewalls, IDS/IPS, and end point security
- Familiarity with popular databases on both windows and UNIX platforms, including Oracle and MS SQL
- Familiarity with common identity, authentication, and directory services, such as Active Directory and LDAP
- Familiarity with sophisticated multinational companies and distributed business models
- Experience defining data protection use cases, documenting business requirements and evaluating technology solutions
- Experience with data risk program design, including alignment to cybersecurity and compliance programs.
- Experience working with data protection and information security policies, standards and procedures
- Experience leading collaborative efforts across organizational silos, including multifunctional teams of IT professionals, legal/compliance teams, and business executives
- Experience with cloud collaboration tools and security/compliance, particularly Microsoft 365
- Familiarity with change management, deployment and operational processes in large IT organizations
- Experience with vendor relationship management
- Professional certifications such as CISSP, CISM, or similar.
- Limited immigration sponsorship may be available.
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $118,700 - 218,600.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disabled-applicants.html
Company Details
Deloitte LLP
New York City, NY, United States
Don't imagine what's next. Discover it. We provide industry-leading audit & assurance services, consulting, tax and advisory services to many of... Read more