Recent Searches

You haven't searched anything yet.

13 Cyber Security Consultant Jobs in San Francisco, CA

SET JOB ALERT
Details...
Capital One
San Francisco, CA | Full Time
$181k-224k (estimate)
2 Weeks Ago
North Star Staffing Solutions
San Francisco, CA | Full Time
$147k-184k (estimate)
2 Months Ago
Forhyre
San Francisco, CA | Full Time
$152k-190k (estimate)
2 Months Ago
blueStone
San Francisco, CA | Full Time
$155k-194k (estimate)
2 Months Ago
U.S. Court of Appeals, Ninth Circuit
San Francisco, CA | Full Time
$119k-151k (estimate)
3 Months Ago
mudrasys
San Francisco, CA | Full Time
$129k-161k (estimate)
1 Week Ago
At-Bay
San Francisco, CA | Full Time
$123k-160k (estimate)
2 Months Ago
blueStone
San Francisco, CA | Full Time
$155k-196k (estimate)
2 Months Ago
Planet Green Search
San Francisco, CA | Full Time
$127k-159k (estimate)
1 Month Ago
Planet Green Search
San Francisco, CA | Full Time
$80k-114k (estimate)
1 Month Ago
Springboard
San Francisco, CA | Part Time
$62k-77k (estimate)
8 Months Ago
Accenture
San Francisco, CA | Full Time
$101k-123k (estimate)
1 Week Ago
Hybrid Pathways
San Francisco, CA | Contractor
$116k-138k (estimate)
5 Months Ago
Cyber Security Consultant
$147k-184k (estimate)
Full Time 2 Months Ago
Save

North Star Staffing Solutions is Hiring a Cyber Security Consultant Near San Francisco, CA

Company Description

As one of the most experienced staffing firms in Denver Colorado, North Star Staffing Solutions prides itself on exceptional services and relationships we've built over the years. We have continued to provide the recruiting and staffing expertise our clients expect and they have acknowledged over and over again that our services are integral to their success. 

Job Description

Locations:

  • Multiple positions in various locations such as St. Louis, San Francisco, San Antonio, New York, Houston, Detroit, Los Angeles, and 5 in Atlanta.

Job Description & Duties:

  • Align information security strategy with business needs.
  • Investigate complex cyber breaches, remediating detect and respond approaches.
  • Optimize information security spending as well as making the Cyber Program Management (CPM) more cost-effective and sustainable.
  • Security Operations Center capabilities improvements.
  • Monitor, maintain and enforce compliance with access management policies, address legal and regulatory compliance issues.
  • Ensure resources and skills for implementing technology and processes are applicable.
  • Helps create solutions that combine hardware, software, and services to normalize, aggregate, correlate, and visualize data from disparate security products. 
  • Assisted organizations in reducing complexities associated with managing vast amounts of security event data while maximizing control over the security infrastructure.
  • Assess, design and implement a security strategy and governance program framework.
  • Design, implement and integrate security solutions that will prevent risks and exposures.
  • Design and implement security policies, procedures and standards that describe pragmatic, risk-based mechanisms to maintain the confidentiality, integrity and availability of information systems and the data processed therein.
  • Design and implement security solutions to monitor the efficiency and effectiveness of security operations, controls and infrastructure.

KEY RESPONSIBILITIES:

  • Enhance the Software Development Life Cycle (SDLC).
  • Establish a security program for the SDLC capture that will utilize the client's current application.
  • Supervise the overall application review process. 
  • Identify application vulnerabilities.
  • Suggest architectural changes and design at procedural and technology levels. 
  • Perform Quality Assurance (QA) review of web-based applications in order to identify and validate application vulnerabilities and perform remediation at architectural and source code levels.
  • Complete the draft, final reports and other deliverables specified within the planning documentation. 
  • Ensure project documentation is complete and archived appropriately. 
  • Subject matter in programming languages and web application environments.
  • Propose vulnerability risk level and estimated level of remediation effort. 
  • Propose code fix or architectural strategies to remediate identified vulnerabilities.
  • Collaborate to confirm appropriateness of a proposed remediation approach or suggest an alternative action and then perform remediation.
  • Collaborate with the engagement team to plan the engagement and develop work programs, timelines, and planning documentation. 
  • Document the business processes dependent on IT while working with the team.
  • Perform high-quality client service by directing daily progress of fieldwork, informing supervisors of engagement status, and managing staff performance.
  • Thorough understanding of complex enterprise systems. 
  • Knowledge of the current IT environment and industry trends to identify engagement and client service issues. 
  • Communicate with the engagement team and management through written correspondence and verbal presentations.

Qualifications

Job Requirements & Qualifications:

  • Requires a bachelor's degree and a minimum of 2 years of related work experience or a graduate degree and approximately 1-2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major.
  • Required experience performing application security vulnerability assessments and attacks including creation of proof-of-concept exploits.
  • Experience using Fortify, AppScan, WebInspect, Burp, ZAP.
  • Used enterprise application development in one or more of the common development platforms such as Java/J2EE, .NET/C#, C/C , PHP, Python, Flash.
  • Performed Information Security strategic planning, architecture migration strategies or security engineering strategy.
  • Proficient in networking and system-level concepts such as web application architecture, REST APIs, SOAP, jQuery, AJAX, message oriented architecture.
  • Experience in key Information Security domains such as identity, access management, cryptography.
  • Enterprise experience with application development for mobile platforms such as iOS or usage of mobile frameworks such as Kony, PhoneGap is a plus.
  • Moderate understanding of best practice methodologies in Application Security including OWASP, mobile.
  • Utilized development methodologies such as waterfall, agile, continuous integration.
  • Written enterprise security standards, policies, coding guidelines.
  • Able to examine issues both strategically and analytically
  • Ability to interact with senior management, technical SMEs, business partners and influence decisions 
  • Must have strong written and verbal communication skills. 
  • Able to effectively communicate with business partners using non-technical terms.
  • Ability to work on multiple simultaneous initiatives/projects/tasks.
  • Must hold or be willing to pursue related professional certifications such as the CISSP, Open Group Certified Architect or CEH certification.
  • Willingness and ability to travel domestically and internationally

MUST:

  • Fortify, AppScan, WebInspect, Burp, ZAP, Java/J2EE, .NET/C#, C/C , PHP, Python, Flash, web application architecture, REST APIs, SOAP, jQuery, AJAX, message oriented architecture,
  • Information Security domains such as identity, access management, cryptography.
  • Understanding of development methodologies such as waterfall, agile, continuous integration. 

Additional Information

All your information will be kept confidential according to EEO guidelines

Job Summary

JOB TYPE

Full Time

SALARY

$147k-184k (estimate)

POST DATE

03/15/2024

EXPIRATION DATE

07/21/2024

WEBSITE

northstarstaffingsolutions.com

HEADQUARTERS

Richardson, TX

SIZE

100 - 200

Show more

North Star Staffing Solutions
Full Time
$86k-110k (estimate)
2 Months Ago
North Star Staffing Solutions
Full Time
$42k-54k (estimate)
2 Months Ago
North Star Staffing Solutions
Full Time
$79k-94k (estimate)
2 Months Ago

The job skills required for Cyber Security Consultant include Information Security, CISSP, Application Security, Computer Science, Agile, API, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Security Consultant. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Security Consultant. Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
SAIC
Full Time
$100k-124k (estimate)
1 Day Ago
For the skill of  CISSP
New Directions Technologies
Full Time
$97k-134k (estimate)
0 Months Ago
For the skill of  Application Security
Tools for Humanity
Full Time
$88k-111k (estimate)
2 Weeks Ago
Show more

The following is the career advancement route for Cyber Security Consultant positions, which can be used as a reference in future career path planning. As a Cyber Security Consultant, it can be promoted into senior positions as a Cyber Security Architect III that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Security Consultant. You can explore the career advancement for a Cyber Security Consultant below and select your interested title to get hiring information.

Forhyre
Full Time
$152k-190k (estimate)
2 Months Ago
mudrasys
Full Time
$129k-161k (estimate)
1 Week Ago

If you are interested in becoming a Cyber Security Consultant, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become a Cyber Security Consultant for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Cyber Security Consultant job description and responsibilities

They plan, design, build, configure, code, run, maintain, and monitor security controls meant to protect data and networks from being breached.

01/29/2022: Colorado Springs, CO

The Cyber Security Consultant takes care of the cyber security projects and makes sure they meet cyber security objectives.

02/02/2022: Nassau, NY

Employ knowledge of penetration testing while ensuring a strict professional, ethical, and social responsibility related to cyber and data security technology professions.

02/12/2022: Middlesex, NJ

Analyze the current security architectural requirements of the organization through effectively checking the software security effectiveness, security architecture vulnerability, and also the various security requirements.

02/11/2022: Saint Petersburg, FL

Communicate Cyber Security risks, threats, and countermeasures to convince decision makers to apply this understanding to develop cyber defense.

01/31/2022: Lansing, MI

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on Cyber Security Consultant jobs

Finally, the consultant needs to be a good negotiator, showing patience and tact when working with people at all levels of the corporate structure.

02/03/2022: Las Vegas, NV

Another security consultant may focus more on the analytical and/or customer service side of the job, effectively using soft skills and communication so that clients better understand them.

03/06/2022: Gary, IN

A successful security consultant must have both technical skills and soft skills.

02/07/2022: Atlantic City, NJ

Security consultants should be skilled at penetration testing and measuring the vulnerability rating of cyber programs and software to understand risk.

03/09/2022: Jacksonville, FL

When a security breach happens, security consultants need to be comfortable making the correct decision quickly.

04/07/2022: Houston, TX

Step 3: View the best colleges and universities for Cyber Security Consultant.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more