DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Jobs

Executive Reporting and Metrics – Cybersecurity Consultant

VISA

Reading Time: 2 mins read
in Jobs

 

Job Description: 

The Cybersecurity Consultant will support development of executive-level Cybersecurity reporting and metrics. The ideal candidate is deadline-driven, highly detail-oriented, and has a track record of effectively communicating complex and/or technical information both written and verbally.

This is a hybrid position. Hybrid employees can alternate time between both remote and office. Employees in hybrid roles are expected to work from the office two days a week, Tuesdays and Wednesdays with a general guidepost of being in the office 50% of the time based on business needs.

Your Responsibilities:

  • Develops executive-level information security communications to enable risk-informed business decision-making.
  • Ensures written deliverables are succinct, complete, defect-free, and geared to an
    executive audience.
  • Responsible for managing projects or processes and providing guidance to other employees in job area
  • Works independently with limited supervision Problems are mostly defined and moderately complex
  • Leads quality control efforts to ensure the accuracy of executive reports comprised of large numbers of data points.
  • Collaborates with technical staff and other key stakeholders to identify, define, collect, and report information security risk metrics relevant to business leadership.
  • Coordinates proactively with stakeholders on metrics, reporting, and other tasks.
  • Provides input to information security reporting and dashboards.
  • Assists in implementation of processes and procedures for cybersecurity reporting and metrics activities.
  • Researches best practices and innovative approaches to enable assessment and communication of information security risk and metrics.
  • Influences others within job sub-function regarding practices, procedures and policies
  • Coach and review the work of lower level professionals

 

US Located Required:  Yes

Location: Foster City, CA – Remote

Schedule: Full time

 

Apply Now

Tags: CaliforniaCybersecurity ConsultantExecutive PositionExecutive Reporting and MetricsHybridIn PersonJobsRemoteUnited StatesVisa
ADVERTISEMENT

Related Posts

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

Dark Wolf Solutions – Blue Team Lead, Cybersecurity Advisor

January 12, 2023
XOR Security – Cyber Hunt/Deception Operations SME

XOR Security – Cyber Hunt/Deception Operations SME

January 12, 2023
Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

Palo Alto Networks – Principal Solutions Architect, SASE/ Zero Trust

January 12, 2023
ITW – IT Security Analyst

ITW – IT Security Analyst

January 12, 2023

More Articles

Jobs

IT Security Specialist

December 2, 2022
Alerts

Widespread credential phishing campaign abuses open redirector links

August 30, 2021
Cyber Review

Cyber Review: Cybercrime through Social Engineering

November 2, 2022
Meme

The future we envisioned…

November 29, 2020

SecurityMetrics Podcast Ep 20: Cyber Work Podcast.

May 20, 2022
Alerts

ICS Advisory (ICSA-21-056-03) – Rockwell Automation Logix Controllers

March 1, 2021

Cool things entrepreneurs do

July 21, 2022
Document

EU Data Protection Reform

March 23, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.