Senior Security Consultant - Southern North OC/LA
Listed on 2026-03-07
-
IT/Tech
Cybersecurity, IT Consultant
POSITION SUMMARY
This position is recognized as an expert Information Security Consultant and performs remote and/or client consulting projects from a pre-sales and post-sales perspective, in support of Nth Generation Computing, Inc.'s enterprise security practice. This position is responsible for assessing, designing, developing, demonstrating, positioning, provisioning, and implementing enterprise security services and solutions; as well as providing ongoing support to Nth Generation's clients, using the best tools, techniques, and products that our clients demand today.
To perform the job successfully, this individual must be able to perform each duty satisfactorily, while always maintaining the Nth Corporate Culture (see Appendix
A). This is a Salaried Exempt position.
This position will primarily serve our Southern California client base. Travel to Los Angeles County, Riverside County, Orange County, San Diego County, and the surrounding areas is expected based on client and/or business needs. The Senior Security Consultant will also be expected to travel to Nth's Irvine and San Diego offices, according to client and/or business needs.
REPORTING STRUCTUREThis position reports to Nth's Director, Information Security, who will be the primary manager. This position may also take direction from members of the executive leadership team, as well as the Nth assigned Project Manager, which may vary on each client project.
ESSENTIAL DUTIES AND RESPONSIBILITIES , include, but not limited to, the following:Supports Nth's Sales and Presales teams in the role of Senior Security Consultant
, adhering to Nth's Sales Process, while always striving to provide top quality solutions and services to Nth's clients.
- Executes security gap assessments based on industry frameworks, such as NIST, CIS CSC, and other applicable frameworks.
- Performs the role of a Virtual Chief Information Security Officer (vCISO), assessing the organization's security posture, providing a prioritized security remediation roadmap, leading security initiatives, and providing security expertise and expert thought leadership.
- Architects enterprise security solutions, based on client needs, that include products/technologies from Nth's security portfolio and respective implementation services.
- Performs ethical hacking services to assess clients' security posture, such as internal, external and remote vulnerability and penetration tests, IT security assessments, and other related tactical security services.
- Compiles comprehensive written reports directly related to clients' specific risk and business plans.
- Provides oral and written post-evaluation reports detailing discussions/conferences with clients to provide remediation suggestions and guidance.
- Interviews and evaluates clients to meet and exceed security‑assessments, penetration testing and remediation requirements.
- Provides timely documentation to clients and internal staff.
Certifications:
Strong knowledge, expertise, and formal certifications on Nth's Security portfolio products, such as the following products: (
Note:
formal training will be made available for some or all of these products to help gain the necessary knowledge and certain required vendor certifications)
- Microsoft Windows Certifications
- Arctic Wolf;
Atakama;
Crowd Strike;
Darktrace;
Dataminr;
Fortinet;
Keeper Security;
KnowBe4;
Log Rhythm;
Mimecast;
Ninja
RMM;
Palo Alto Networks;
Cyber Ark;
Delinea;
Varonis; OKTA;
Proofpoint/Wombat;
Rapid7;
Zscaler; F5 Networks;
Verkada;
Broadcom/VMware Security solutions;
Networking (HPE, Aruba, Cisco, Juniper, F5, A10 Networks, VMware SDN/NSX);
Containers (Docker, Kubernetes);
Converged Infrastructure (HPE, Dell, VMware, Cisco);
Cloud Computing solutions (Public, Hybrid and Private Cloud; IaaS, SaaS, PaaS, XaaS, AWS, Azure, GCP, 11:11 Systems, Wasabi);
Microsoft Server, AD, Exchange, MSSQL, SharePoint, Office
365, Azure - Other leading Security products and solutions with whom Nth may partner in the future.
- Nth's active Third-Party Services Partners with security services offerings.
Training will be provided on…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).