This role is for a Mergers and Acquisition Cybersecurity Consultant as part of the Experian Global Security Office (EGSO).
In this role, you will lead the program creation and strategy around a secure path to acquisition with Experian. For all new acquisitions, you will support the review of a potential acquisition’s existing security tooling and processes and compare them to Experian standards.
This is a cross-functional / multi-domain role that is required to aid the M&A lead from a Cybersecurity perspective across all Cybersecurity domains such as Identity & Access Management, Product Security & Architecture, Secure Software Development Lifecycle and Program Management.
Additionally, this role will be expected to support M&A processes and aid in due diligence for both pre- and post-acquisition.
Job Responsibilities :
Help with day to day fieldwork that involves meetings with potential target companies and the collection of evidence through fieldwork while documenting identified risks
Work with the M&A Due Diligence team to review key control gap assessments / analysis prior to purchase of a new company to help mitigate identified risks
Aid in the review of new acquisitions post close to validate that key security risks identified during due diligence are still correct and document findings
Review existing business and product processes for alignment optimization opportunities
Communicate to senior stakeholders plans and strategy for the Cybersecurity approach
Influence / Engage with peers and company leadership on the M&A integration approach
5 years of work experience with a bachelor’s degree
Advanced English proficiency
Proficiency and prior work experience in multiple cybersecurity technical domains (i.e. Network Security, Endpoint Security, Cloud Security, Security Architecture, Software Security, IAM, Encryption, etc.)
Experience with all verticals of Enterprise Security processes and tools
Experience with enterprise / product architecture and design
Experience with system development lifecycle including relationship with technology deployment
Extensive experience in leading technical teams in implementation of complex cybersecurity solutions.