IT Cyber Security Opportunities Job Description  

Capgemini With more than 180,000 people in over 42 countries, Capgemini is one of the world’s foremost providers of consulting, technology and outsourcing services. The Group reported 2015 global revenues of EUR 11.9 billion. Together with its clients, Capgemini creates and delivers business and technology solutions that fit their needs and drive the results they want.

A deeply multicultural organization, Capgemini has developed its own way of working, the Collaborative Business ExperienceTM, and draws on Rightshore®, its worldwide delivery model. Learn more about us at                           …

Rightshore® is a trademark belonging to Capgemini 

Capgemini’s robust Outsourcing offerings include:

Applications Management, Infrastructure Management and Business Process Management

We combine these services with our deep industry knowledge and experience to provide the change agent to accelerate business growth. We generate quality and speed through our proven tools, methods and global centers. These capabilities, coupled with our program management expertise are tailored to fit the most challenging business needs. 

Desired designations: CISSP, CHFI, CEH, NERC 

Areas of accountability include: Security Assurance & Compliance

• Conducts compliance and management audits;

• Develops audit plans for allocated audit assignments;

• Can contribute to contract compliance work;

• Decides and reports audit findings;

• Suggests corrective actions;

• Tracks findings from previous audits through to closure.

Security Consulting

• Knowledgeable about the ISMS;

• Provides advice and guidance about Security matters to one or more significant accounts or to a large delivery center;

• Able to train people up to senior levels in Security and control matters;

• Builds experience that counts towards certification in Security management, auditing, or Security engineering;

• Ensures that people who provide information for Security purposes are made aware of the outcome of its analysis and use 

Security, Engineering, TDA/Architect, Bids/Solution, Design

• Builds, designs and executes the analysis and tools required to drive process improvements on discrete projects or accounts;

• Able to manage and direct others in the use of techniques to analyze and resolve Security issues. 

Security Investigation

• Able to perform forensic collections of data and to conduct detailed forensic analysis tasks including data recovery, production of forensic images and compilation of forensic examination reports

• Collection and management of evidence to ensure that the chain of custody is fully documented in accordance with local statutes and policies

• Use of forensic and data mining tools to collect, search, recover, sort and organize large amounts of information in all phases of an investigation

• Conducting interviews to gather additional information in support of investigations verbal presentation skills to work towards ‘Expert Witness’ status

• Production of high quality written reports presenting complex technical matters clearly and concisely and articulating expert opinions based on analysis

 – Experience developing Security Policy Framework/Standards

– Experience with Audit & Compliance activities

– Experience in forensic analysis

– Experience with ISO27001 Implementation

– Experience with Vulnerability Management processes and systems

– Experience with application security scanning tools and methodologies

– Experience with SIEM tools and processes

– Experience with Anti-spam Management processes and systems

– Experience with Access Control Management processes and systems

– Experience with encryption techniques.

Apply now