Cyber Compliance Associate

SLV-San Salvador-Calle Cortez Blanco #8 Urb. Madreselva

RSM

RSM US LLP is the leading U.S. provider of assurance, tax and consulting services focused on the middle market.

View all jobs at RSM

Apply now Apply later

We are the leading provider of professional services to the middle market globally, our purpose is to instill confidence in a world of change, empowering our clients and people to realize their full potential. Our exceptional people are the key to our unrivaled, inclusive culture and talent experience and our ability to be compelling to our clients. You’ll find an environment that inspires and empowers you to thrive both personally and professionally. There’s no one like you and that’s why there’s nowhere like RSM.

We are currently looking for technical Consultants for our Security, Privacy and Risk Consulting (SPR) practice. The candidate will work with teams of security and privacy staff in a wide variety of systems environments.  Our SPR Consulting team serves the Information Security and Data Privacy related needs of our clients. This team assists clients with selecting, improving, controlling, securing, managing and monitoring the appropriate systems to address their information needs.  We serve a diverse base of clients in a variety of industries, and understanding how technology impacts the operation and growth of organizations is what we do best. 

Responsibilities:

  • Assess security of client networks, hosts, and applications 
  • Determine technical, business impact and likelihood of identified security issues and provide remediation guidance to clients 
  • Perform analysis and testing to verify the strengths and weaknesses of mobile and web applications and web services (SOAP, WSDL, UDDI) 
  • Perform Internet penetration testing using blackbox and whitebox methodologies 
  • Review application code, system configurations and device configurations using manual and automated techniques 
  • Measure and report clients’ compliance with established industry or government requirements 
  • Identify leaked client data on open and closed (Deep and Dark Web) sources  
  • Perform analytical investigations into specific threat actors, ransomware, and campaigns 
  • Communicate technical findings to a non-technical audience effectively 
  • Create and review threat intelligence programs for clients using established intelligence models 
  • Work with RSM consulting professionals with a variety of credentials including Certified Ethical Hacker (CEH), Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified Threat Intelligence Analyst (CTIA®) 

Basic Qualifications: 

  • Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences with a major in Computer Science, Information Technology, Information Systems Management, Information Security, intelligence, digital forensics, cybersecurity or other similar degrees 
  • Technical background in computer science and cybersecurity related fields 
  • Strong knowledge of computer network technologies, protocols/topologies, digital forensics and endpoint protection, or threat intelligence 
  • Software development, programming and/or scripting experience (Perl, Python, C, Java, PHP, ASP, etc.) 
  • Ability to track threat actors across Dark Web criminal forums and marketplaces and ability to communicate findings 
  • Ability to track malware campaigns and understand adversarial activity from an intelligence perspective 
  • Basic understanding of intelligence, including intelligence lifecycle, Kill Chain, Diamond model, and Priority Intelligence Requirements 
  • Proven track record of an analytical and curious mindset in problem solving 
  • The ability to interpret and convey technical information through written and oral communications to all levels of technical aptitude, including senior management 
  • High degree of integrity and confidentiality, as well as ability to adhere to company policies and best practices 
  • Possess a strong internal drive and motivation for continuous improvement 

Preferred Qualifications: 

  • Practical hands-on or lab experience with IT infrastructure components such as servers, firewalls, IDS systems and other network infrastructure components 
  • Practical hands-on or lab experience  with security applications, such as a AppScan, Metasploit, BurbSuite, Nessus, Social Engineering Toolkit, Kali Linux, etc., or other commercial and public domain security tools 
  • Operating system configuration and security experience (HP-UX, Linux, Solaris, AIX, etc.) 
  • Configuration and security experience with web servers and web applications (Apache HTTP/Tomcat, Microsoft IIS, Sun One, Oracle iPlanet, IBM WebSphere, etc.) 
  • Database Configuration and Security experience (MySQL, Microsoft SQL, IBM DB2, Sybase, Oracle, etc.) 
  • Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking 
  • Internship or overall experience with threat intelligence vendor or familiarity with various threat intelligence tools and platforms 

At RSM, we offer a competitive benefits and compensation package for all our people. We offer flexibility in your schedule, empowering you to balance life’s demands, while also maintaining your ability to serve clients. Learn more about our total rewards at https://rsmus.com/careers/el-salvador.html.

RSM does not tolerate discrimination and/or harassment based on race; colour; creed; sincerely held religious beliefs, practices or observances; sex (including pregnancy or disabilities related to nursing); gender (including gender identity and/or gender expression); sexual orientation; HIV Status; national origin; ancestry; familial or marital status; age; physical or mental disability; citizenship; political affiliation; medical condition (including family and medical leave); domestic violence victim status; past, current or prospective service in the in the Salvadoran Army; pre-disposing genetic characteristics or any other characteristic protected under applicable provincial employment legislation. 

Accommodation for applicants with disabilities is available upon request in connection with the recruitment process and/or employment/partnership. RSM is committed to providing equal opportunity and reasonable accommodation for people with disabilities. If you require a reasonable accommodation to complete an application, interview, or otherwise participate in the recruiting process, please send us an email at careers@rsmus.com.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  12  0  0
Category: Compliance Jobs

Tags: C CEH CISA CISM CISSP Compliance Computer Science Firewalls Forensics IDS IT infrastructure Java Kali Linux Malware Metasploit Monitoring MySQL Nessus Oracle Pentesting Perl PHP Privacy Python Scripting Solaris SQL Threat intelligence Tomcat

Perks/benefits: Competitive pay Medical leave Startup environment

Region: North America
Country: El Salvador

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.