Post Classifieds

2022 - Summer - Consulting Intern - Risk Consulting - SPRC Cyber Response


Upload Resume (optional)

By clicking this button,
you agree to the terms of use

Company

RSM

Description

Position Description
We are currently looking fortechnicalConsultants for our Security,Privacyand RiskConsulting(SPR)practice. The candidate will work with teams of security and privacy staff in a wide variety of systemsenvironments. Our SPRConsultingteam serves the Information Security and Data Privacy related needs of our clients. This team assists clients with selecting, improving, controlling, securing, managing and monitoring the appropriate systems to address their information needs. We serve a diverse base of clients in a variety ofindustries, andunderstanding how technology impacts the operation and growth of organizations is what we do best.
As a Consulting Associate, you will jump start your career through a comprehensive training and development program where you will be exposed to all our Consulting Solution Practices. This training will include:
- Consulting process, tools and methods
- Client engagement economics
- Presentation and business writing skills
- Time management and project delivery
- Communication skills
Examples of candidate's responsibilities include:
- Assess security of client networks, hosts, and applications
- Determine technical, business impact and likelihood of identified security issues and provide remediation guidance to clients
- Perform analysis and testing to verify the strengths and weaknesses of mobile and web applications and web services (SOAP, WSDL, UDDI)
- Perform Internet penetration testing usingblackboxandwhiteboxmethodologies
- Review application code, system configurations and device configurations using manual and automated techniques
- Measure and report clients compliance with established industry or government requirements
- Identify leaked client data on open and closed (Deep and Dark Web) sources
- Perform analytical investigations into specific threat actors, ransomware, and campaigns
- Communicate technical findings to a non-technical audience effectively
- Create and review threat intelligence programs for clients using established intelligence models
- Work withRSMconsulting professionals with a variety of credentials including Certified Ethical Hacker (CEH), Certified Information Systems Security Professionals (CISSP); Certified Information Systems Auditor (CISA),Certified Information Security Manager (CISM), Certified Threat Intelligence Analyst (CTIA)
Basic Qualifications:
- Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences with a major inComputer Science, Information Technology, Information Systems Management, Information Security, intelligence, digital forensics, cybersecurityor other similar degrees
- Technical background in computer science andcybersecurityrelated fields
- Strong knowledgeof computernetwork technologies, protocols/topologies, digital forensics and endpoint protection, or threat intelligence
- Software development, programming and/or scripting experience (Perl, Python, C, Java, PHP, ASP, etc.)
- Ability to track threat actors across Dark Web criminal forums and marketplaces and ability to communicate findings
- Ability to track malware campaigns and understand adversarial activity from an intelligence perspective
- Basic understanding ofintelligence,including intelligence lifecycle, Kill Chain, Diamond model, and Priority Intelligence Requirements
- Proven track record of an analytical and curious mindset in problem solving
- The ability to interpret and convey technical information through written and oral communications to all levels of technical aptitude, including senior management
- High degree of integrity and confidentiality, as well as ability to adhere to company policies and best practices
- Possess a strong internal drive and motivation for continuous improvement
- A minimum 3.0 GPA is preferred
Preferred Qualifications:
- Practical hands-on or lab experience with IT infrastructure components such as servers, firewalls, IDS systems and other network infrastructure components
- Practical hands-on or labexperience withsecurity applications, such as aAppScan,Metasploit,BurbSuite, Nessus, Social Engineering Toolkit, Kali Linux, etc., or other commercial and public domain security tools
- Operating system configuration and security experience (HP-UX, Linux, Solaris, AIX, etc.)
- Configuration and security experience with web servers and web applications (Apache HTTP/Tomcat, Microsoft IIS, Sun One, OracleiPlanet, IBM WebSphere, etc.)
- Database Configuration and Security experience (MySQL, Microsoft SQL, IBM DB2, Sybase, Oracle, etc.)
- Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking
- Internshipor overallexperience with threat intelligence vendor or familiarity with various threat intelligence tools and platforms
You want your next step to be the right one. You've worked hard to get where you are today. And now you're ready to use your unique skills, talents and personality to achieve great things. RSM is a place where you are valued as an individual, mentored as a future leader, and recognized for your accomplishments and potential. Working directly with clients, key decision makers and business owners across various industries and geographies, you'll move quickly along the learning curve and our clients will benefit from your fresh perspective.
Experience RSM US. Experience the power of being understood.
RSM is an equal opportunity/affirmative action employer. Minorities/Females/Disabled/Veterans.
[]
Associated topics: business, business analysis, business intelligence, consult, consultant, customer, marketing, sales, senior consultant, support analyst
Posted Date
09/29/2021

Listing ID
77074917
Upload Resume (optional)

By clicking this button,
you agree to the terms of use

Related The Summa Jobs Listings


Log In

or Create an account

Employers & Housing Providers

Employers can list job opportunities for students

Post a Job

Housing Providers can list available housing

Post Housing

Log In

Forgot your password?

Your new password has been sent to your email!

Logout Successful!

Please Select Your College/University:

You just missed it! This listing has been filled.

Post your own housing listing on Uloop and have students reach out to you!

Upload An Image

Please select an image to upload
Note: must be in .png, .gif or .jpg format
OR
Provide URL where image can be downloaded
Note: must be in .png, .gif or .jpg format