Devoteam

Zero Trust Study and Implementation Consultant

Join Devoteam as a Zero Trust Study and Implementation Consultant in Levallois-Perret. Guide clients in Zero Trust strategies, requiring a cybersecurity degree and 2-10 years' experience. Enjoy career growth, certifications, and a vibrant community.

Department - JobBoardly X Webflow Template
Consulting
Job Level - JobBoardly X Webflow Template
Entry Level
ServiceNow Role Type:
ServiceNow Modules:
Department - JobBoardly X Webflow Template
DevOps
Department - JobBoardly X Webflow Template
Governance, Risk, and Compliance
Department - JobBoardly X Webflow Template
Virtual Agent
Department - JobBoardly X Webflow Template
Hardware Asset Management
ServiceNow Certifications (nice to have):

Job description

Date - JobBoardly X Webflow Template
Posted on:
 
October 29, 2024

Devoteam

Devoteam is a technology consulting company, cloud, cyber, AI, and sustainable development. With over 11,000 employees in more than 25 countries, we have guided our clients for nearly 30 years in the technological transformation of their activities.

In France, we have 4,500 Digital Architects distributed across more than 50 expertise tribes and coached by over 400 expert managers.

Joining us means: working on innovative and sustainable projects to put technology at the service of humanity, continuing to certify yourself on the latest market technologies, and sharing unique moments with colleagues!

To learn more about Devoteam, visit here.

Devoteam Cyber Trust

Devoteam Cyber Trust is the dedicated team for Cybersecurity expertise. Composed of over 800 passionate experts worldwide, including 450 in France, we advise our clients on complex topics: cyber, risks, resilience, network security, cloud security, encryption, audit, and security around our 5 partners AWS, Google, Microsoft, Salesforce, and ServiceNow.

To learn more about our career paths, discover Adel's journey, a cyber security consultant at Devoteam Cyber Trust!

Job Description

Zero Trust Consultant

As a Zero Trust Consultant, you will play a crucial role in guiding our clients in the implementation and improvement of Zero Trust security strategies.

Your expertise will be essential in evaluating current security postures, identifying vulnerabilities, and providing strategic recommendations to establish a Zero Trust framework.

You will collaborate with multidisciplinary teams, offering perspectives on identity and access management, network security, and data protection.

Responsibilities:

  • Conduct maturity studies to analyze and evaluate the current state of clients in relation to Zero Trust principles, taking into account the specifics of the 5 pillars (IAM, Endpoint, Network/Cloud, Application, Data).
  • Propose action plans and roadmaps for progressive transformation towards Zero Trust.
  • Collaborate with clients to define and apply security policies, ensuring compliance with Zero Trust principles.
  • Design and implement robust identity and access management solutions to improve authentication and authorization processes (RBAC / ABAC).
  • Assist in integrating security technologies such as authentication and authorization (RBAC / ABAC) solutions, SASE solutions, endpoint protection (EDR/XDR), and threat intelligence to strengthen the Zero Trust security posture.
  • Provide expertise in network segmentation, micro-segmentation, and access control to the necessary.
  • Educate clients on Zero Trust principles, emphasizing the importance of continuous monitoring, adaptive security, and risk-based decision-making.
  • Stay informed about industry trends, emerging threats, and advancements in Zero Trust technologies, providing expertise to clients and internal teams.
  • Collaborate with other cybersecurity professionals to develop and deliver training programs on Zero Trust concepts and practices.
  • Document and communicate project progress, security results, and recommendations to technical and non-technical stakeholders.

Qualifications:

  • University degree in cybersecurity, computer science, or a related field; relevant certifications (e.g., CISSP, CCSP, CCSK, CCZT) are a plus.
  • Proven experience in designing and implementing secure architectures in complex enterprise environments, especially those based on the cloud.
  • Deep understanding of cybersecurity principles, risk management, and compliance requirements.
  • Mastery of identity and access management, network security, and data protection concepts.
  • A deep understanding of Zero Trust architectures and practical experience in integrating APIs to secure applications is essential.

Why Join Us?

Career development guided by a tech manager with regular exchanges; access to technical and soft skills certifications with a minimum of 2 certifications per year, vouchers provided, and expert coaching; choice partners: Google, AWS, Microsoft, ServiceNow, Snowflake, MuleSoft, Outsystems, SAP, Databricks, Gitlab,...

Varied career paths through internal mobility: geographic, functional, and entity/tribe/squad; internal roles to build your career within the Group: manager, internal trainer, tech leader, digital champion, squad leader,...

Strong community spirit through internal events and sports and cultural activities thanks to over 30 Happiness@Devoteam clubs, allowing you to meet your colleagues regularly and share your passions; Tech for People vision embodied in our values, responsible practices, our sustainable development program recognized by the Ecovadis label, and our strong commitments with the Devoteam Foundation.

Recruitment Process

The recruitment process at Devoteam consists of 2 to 3 interviews:

  • Talent Acquisition Interview: the goal is to review your skills, your level of English, and validate your motivation elements
  • Tech & Business Interview: this interview aims to deepen your technical skills and verify their alignment with our needs in an exchange with a subject matter expert
  • Leadership Interview: it allows evaluating your potential, ambitions, and considering your evolution within Devoteam

We prefer at least one in-person interview. A reference is requested, and depending on your profile, technical, English, or personality tests may be sent to you.

If your application is retained, we will send you a proposal presenting the hiring conditions. Upon acceptance, the employment contract is formalized.

Equal Opportunities

The Devoteam Group works for equal opportunities, promotes its collaborators and employees based on merit, and actively fights against all forms of discrimination.

We are convinced that diversity contributes to creativity, dynamism, and excellence in our organization. All our posts are open to people with disabilities.

Requirements Summary

University degree in cybersecurity, computer science, or related field; 2-10 years of experience in designing and implementing secure architectures, identity and access management, network security, and data protection