InfoSec Consultants Wanted!

The Information Security Consultant will engage in consulting projects with TruSec clients to:
  • Assess, understand and define client organization’s current and future requirements in terms of information security.
  • Assess information security risks associated with strategic planning, implementation and operational activities.
  • Performs risk and impact analysis to help clients make effective financial investments.
  • Analyze information to identify capability gaps in the context of regulatory considerations and industry benchmarks.
  • Help develop actionable, repeatable and reportable security strategies.
  • Accommodate continual change in the client’s business, security and IT environments.
  • Assist with design and implementation of internal controls and procedures that ensure compliance with regulatory requirements that relate to information security.
  • Recommend the implementation of new controls in support of regulatory compliance.


  • Undergraduate degree in Information Technology, Accounting, Business Administration or related areas.
  • 6-10 years work experience in information systems and technology auditing in a multi-platform environment (preferably with knowledge of at least four of the following technologies: Solaris, Linux, Windows, Oracle, MS-SQL, Sybase, routers/switches, storage technologies, firewalls, web technologies, E-Mail systems, messaging technologies, IBM mainframe, etc.).; financial services experience preferred, but not required.
  • At least one of CISA/CISSP/CEH certifications is required.
  • Excellent communication and interpersonal skills.
  • Strong organizational and time management skills.
  • Understand, and proactively and regularly communicate regulatory compliance requirements to clients.
  • Ability to work independently and within a team environment.
  • Highly motivated, pro-active and results oriented professional.
  • Up to 50% travel to USA and its territories, Latin America and Canada.

General Knowledge and Technical Skills:

Policy and procedure development, implementation and management; data, operating system, network, middleware, messaging, application and mobile service security controls; malware prevention solutions; encryption; vulnerability and threat management; security incident response; identity and access management; assessment, metrics and benchmarking; third-party security program management; security awareness.

To apply, please send your resume to [email protected]