Cyber Defense Manager
  • South Africa Johannesburg
  • KPMG South Africa
1 year before
31.12.2023
Oversee and Govern
Cybersecurity Management
Job Description

About the job
Job Title/position

Manager – Cyber Defense

Function And Business Unit

Advisory – Risk Consulting: Technology Assurance (Cyber Security)

Description Of The Role And Purpose Of The Job

KPMG is currently seeking a Manager to join our Cyber Security consulting and assurance practice. Cyber Security is a part of wider Technology Assurance unit.

The KPMG Cyber Security practice is one of our fastest growing practices. We are seeing tremendous client demand, and looking forward we don't anticipate that slowing down. In this ever-changing market environment, our professionals must be adaptable and thrive in a collaborative, team-driven culture. At KPMG, our people are our number one priority. With a wealth of learning and career development opportunities, a world-class training facility and market leading tools, we make sure our people continue to grow both professionally and personally. If you're looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Technology Assurance.

You Will Be Exposed To a Range Of Exciting Projects Across Industry Sectors And Service Lines Including

Working with KPMG you will consult on client projects, translating business and customer needs into innovative business and technology solutions. You will identify changes and recommend solutions that will typically involve a combination of cyber strategy and security excellence outcomes.

Driving the linkage between business strategy and cyber security (and vice versa), to deliver meaningful outcomes
Defining the technology strategy to create new streams of value in a business, and defining associated technology execution roadmaps
Designing innovative technology solutions for improving cyber security posture and advise on reducing cyber risk
Identify and assist client in meeting compliance requirement for and through cyber security
Assist in program management or assurance for shaping and defining security programs and embed cyber security in wider digital or business program
Working closely with the local team and member firms to bring innovation to our existing capabilities to help KPMG remain at the forefront of strategy, operational excellence and technology practices and thinking

As part of the role you will be expected to have detailed knowledge of security technologies and their application to addressing business challenges. The focus will be on delivering high quality engagement outcomes for our clients and maintaining productive client relationships that allow you to build strong professional networks over time.

We believe in diversity of thought background and unique experience. You need to have a solid background in technology as well as consulting. You're passionate about technology and innovation, finding novel approaches to solve problems. You thrive in a collaborative and innovative culture and want to join a firm that values problem solvers, the kind of people who reimagine the possible for their clients and key stakeholders.

We are looking for people in this role with a passion for and / or experience in the following areas:

Experienced in cyber security strategy, planning and implementation
Strong IT and cyber security technology acumen
Thorough knowledge of standards such as NIST, ISO 27001 and other applicable industry requirements
An experience in automation of compliance and assurance is desirable
Knowledge of application and security architecture on conventional on-premise and cloud stacks (IaaS, PaaS, SaaS)
Abreast of major technology trends, innovations and their practical (or potential) application
Approaches to technology governance and innovative ways of working
Excellent documentation and report writing skills

Key Responsibilities

Take responsibility for leading technology based consulting engagements, managing the day-to-day delivery effort and work of the delivery team.
Provide subject matter expertise in the business for specific technical security domains.
Engage in planning, design, implementation, testing, and operation of cyber breach resilience processes and systems on client networks and applications.
Provide guidance on security architecture, assisting clients with reducing their attack surface and optimizing their cyber defensive capabilities to adapt to modern threats.
Support recovery efforts at impacted clients, helping them to minimize operational impact and resolve immediate defensive gaps.
Develop next generation cyber resilience service offerings that help minimize impact, decrease likelihood, and increase adaptability to cyber threats.
Analyse, workshop and present insights and recommendations enabled by strategic thinking, technical knowledge and strong and clear communication skills.
Undertake and lead business development activities including the creation of compelling and differentiated value propositions in opportunity pursuits.
Lead and coach others in engagements, and mentoring staff as they grow their capabilities, careers and client service impact. Performance management of colleagues to aid in their career growth.
Support a high-performance culture to consistently deliver quality outcomes for clients and great growth opportunities and mentorship for junior colleagues.
Ability to identify potential business development / sales opportunities.
Demonstrate an ability to translate complex technical results into business language through professional report writing.
Extend the teams technical capabilities, toolsets and methodologies to ensure quality and efficiency.
Knowledge of current and emerging IT security technologies.
Maintain awareness of latest and common security threats, attack vectors and TTPs.
Ability to diagnose and troubleshoot technical issues.

Skills And Attributes Required For The Role

Demonstrate a strong grasp of business processes and risk management in areas such as cyber security, cloud computing, identity management, security compliances, technology risk management, and others
Knowledge of enterprise IT environments, cloud platforms and governance processes. The candidate must be proficient with technology platforms and communicate this information to the engagement team and client management through written correspondence and verbal presentations.
Plan and execute client engagements focusing on assessment, review, design and/or implementation of security strategy; identify improvement opportunities in the areas of process efficiency and security including role-based security and identity and access management based on KPMG's methodology
Identify and evaluate complex business and technology risks and remediation methods to mitigate risks
Contribute to practice growth by leading solution design and innovation related to cloud security platforms

Minimum requirements to apply for the role (including qualifications and experience):

A minimum of 5 - 8 years of experience in Information Security or in a technology related field. At least 2 years’ experience in leading a team in related subject matter.
Bachelor's degree from an accredited college/university or equivalent experience.
Security related certifications such as CISSP, CISA, CISM, OSCP, OSCE, PenTest+, CEH or equivalent
Experience in leading and conducting penetration tests, red team, purple team and technical vulnerability assessments.
Experience in conducting web and mobile application penetration tests
Experience in infrastructure, operating system (including AD) and application security assessments against leading benchmarks.
Experience in conducting cloud security assessments (Azure, AWS, Google)
Experience in Operational Technology security assessments will be advantageous.
Demonstratable track record in security research / training. Presence on GitHub, HackTheBox, TryHackMe, etc will be advantageous.
Excellent written and verbal communication, facilitation, leadership, business development, and presentation skills
Ability to travel, subject to regulations
Consulting experience from a well-established consulting practice preferred

Minimum requirements to apply for the role (including qualifications and experience):

A minimum of 5 - 8 years of experience in Information Security or in a technology related field. At least 2 years’ experience in leading a team in related subject matter.
Bachelor's degree from an accredited college/university or equivalent experience.
Security related certifications such as CISSP, CISA, CISM, OSCP, OSCE, PenTest+, CEH or equivalent
Experience in leading and conducting penetration tests, red team, purple team and technical vulnerability assessments.
Experience in conducting web and mobile application penetration tests
Experience in infrastructure, operating system (including AD) and application security assessments against leading benchmarks.
Experience in conducting cloud security assessments (Azure, AWS, Google)
Experience in Operational Technology security assessments will be advantageous.
Demonstratable track record in security research / training. Presence on GitHub, HackTheBox, TryHackMe, etc will be advantageous.
Excellent written and verbal communication, facilitation, leadership, business development, and presentation skills
Ability to travel, subject to regulations
Consulting experience from a well-established consulting practice preferred


Quick response

Required Knowledge
  • K0001   Knowledge of computer networking concepts and protocols, and network security methodologies.
  • K0002   Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • K0004   Knowledge of cybersecurity and privacy principles.
  • K0005   Knowledge of cyber threats an`d vulnerabilities.
  • K0061   Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • K0070   Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • K0126   Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
  • K0149   Knowledge of organization's risk tolerance and/or risk management approach.
  • K0151   Knowledge of current and emerging threats/threat vectors.
  • K0169   Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
  • K0179   Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • K0180   Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • K0332   Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
  • K0342   Knowledge of penetration testing principles, tools, and techniques.
  • K0624   Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)

Required Skills
  • S0027   Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Required Abilities
  • A0161  Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).