Consultant– Cryptography and Key Management | Remote, USA Optiv Optiv manages cyber risk so you can secure your full potential. Cybersecurity advisory services and solutions. Powered by the best minds in cyber. View company page This position will be fully remote and can be hired anywhere in the continental U.S. Our consultants are skilled technical and consultative resources expected to be strong in both technical and soft skills. A Consultant must be a proven self-starter with the ability to problem-solve, communicate, participate in diverse project teams from a technical perspective, and interface effectively with customers, vendor partners, and colleagues. Establish & maintain productive and respectful relationships with the delivery team, practice management, and client management team. You will actively contribute to improving operational efficiency on projects and internal initiatives. Deliver timely engagements and works closely with Practice Directors to drive training and education, career development, performance development, and collaboration across the team. In line with Optiv’s commitment to quality, you will confirm that work is of the highest quality as per Optiv’s quality standards, by reviewing the work provided by other members. How you’ll make an impact: Possess strong knowledge of cryptographic process, programs, and algorithms. Design, build and operate certificate lifecycle management and key management solutions. Participate and occasionally lead in capacity planning and hardware specification recommendation efforts for cryptography and PKI solutions. Participate in cryptography solution deployment activities, connector configuration, custom rule development, workflow configuration and development, and third-party system integration. Participate in User Acceptance Testing efforts and occasionally leads the efforts. Design and implement cryptography technology build processes for both small and large projects. Successfully provide knowledge transfer and post production support activities as necessary. Effective team communicator. Mentors less experienced consultants Maintain professional and technical knowledge by attending educational workshops Obtain and maintain top tier vendor certifications. Complete administrative project tasks like time and expense entry, status reporting, and project completion reporting. What we’re looking for: Bachelor’s degree and approximately 2-5 years of related work experience. Approximately 2-5 years of technical cryptography architecture experience Extensive knowledge and implementation experience with at least one of the following technology solution sets: Thales CipherTrust Manager, Thales Luna HSMs, Venafi CLM, Keyfactor CLM Ancillary experience with Entrust nCipher, Entrust nShield, Fortanix, Akeyless or AppViewX is a plus Thorough understanding of large scale environments Strong consulting and client advisory skills Process-oriented individual with strong attention to detail, and strong organizational skills Excellent, detailed writing skills Expert knowledge of using Microsoft Office and Visio. Ability to write scripts (Java, Python, Perl) is a plus Ability to build relationships with and influence other functional areas Basic understanding of Services organization and key areas of focus. Ability to build consensus. Ability to manage multiple tasks in parallel. Valid driver’s license in the US The successful candidate should hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA. Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer (EEO). All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, status as an individual with a disability, veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy.By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view ourApplicant Privacy Notice . If you sign up to receive notifications of job postings, you may unsubscribe at any time. Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general – ordered by popularity of job title or skills, toolset and products used – below. #J-18808-Ljbffr
Consulting user-acceptance-testing Problem-solving Microsoft Visio capacity-planning key-management Technology savvy Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Microsoft Office Communication vendor Administrator Akeyless cryptography