Cyber Data Protection/PKI Manager

Deloitte T.T.L.
Charlotte, United States of America
yesterday

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
$ 266K

Job location

Charlotte, United States of America

Tech stack

Amazon Web Services (AWS)
Azure
Bash
Cloud Computing
Cloud Computing Security
Computer Security
Continuous Integration
Data Discovery
Information Leak Prevention
Data Security
Identity and Access Management
Python
Key Management
Public Key Infrastructure
Powershell
Zero Trust Network Access
Google Cloud Platform
Load Balancing
Data Classification
Kubernetes
Infrastructure Automation Frameworks
Information Technology
Api Design
Api Gateway
REST
Devsecops

Job description

  • Serve as a subject matter expert and trusted advisor to our clients, assisting them to evaluate strategic and practical data protection and encryption requirements based on new and emerging data risks, advising on best practices for data encryption, decryption, and secure key management
  • Assist clients in designing, implementing and operating technology and process solutions to reduce data risks, developing and leading the implementation of encryption strategies to protect sensitive data across various environments, including cloud, on-premises, and hybrid infrastructures, to manage the deployment and lifecycle of PKI systems, ensuring robust and scalable certificate management processes, monitor and maintain the health of certificate infrastructures to prevent downtime and security breaches, and assist with developing requirements, evaluating vendor solutions, architecting, implementing and operating data protection solutions
  • Aid in the delivery of client engagements, ensuring success by:
  • Driving day-to-day execution, communicating updates to clients and firm leadership
  • Providing leadership and support to delivery teams to ensure completion and accuracy of high-quality work products
  • Tracking and reporting on project timelines to ensure on time and on budget delivery
  • Stay up to date on emerging encryption technologies (e.g., post-quantum cryptography, confidential computing, secure enclaves, envelope encryption) and industry trends around cyber risk, data protection and cryptography practices.
  • Proactively evaluate and recommend new tools and solutions to enhance data security

The Team

Our Cyber Strategy & Transformation offering develops and transforms cyber programs in line with a client's strategic objectives, regulatory requirements, and risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes design of the cyber organization, governance, and risk assessments.

Requirements

Do you have experience in Team management?, Do you have a Bachelor's degree?, Required:

  • Bachelor's degree in Cybersecurity, Information Security, Engineering, Computer Science, Information Technology or related field
  • 7+ years of professional experience within data protection and information security, which may include Data Discovery, Data Classification and Rights Management, Data Access Governance, Data Loss Prevention, Cloud Access Security Broker, Encryption, Certificate Lifecycle Management, Cloud Security, SaaS Security
  • 7+ years with PKI concepts: Deep expertise in PKI architecture and enterprise trust models
  • 5+ years leading CLM strategy, design, and implementation using platforms such as AppViewX, Venafi, Keyfactor, DigiCert, or similar
  • Advanced knowledge of cryptography, certificate lifecycle processes, key management, HSM integration, and crypto policy enforcement
  • Ability to define target-state architecture, integration patterns, and operating models for large-scale environments
  • Hands-on understanding of certificate automation across load balancers, WAFs, API gateways, Kubernetes, cloud, web/app servers, and network/security infrastructure
  • Experience leading discovery, inventory rationalization, remediation, renewal automation, and compliance monitoring programs
  • Strong client leadership skills, including executive stakeholder management, workshop facilitation, roadmap alignment, and decision-making support
  • Ability to lead technical workstreams, architects, engineers, and offshore/onshore teams
  • Experience translating business, operational, and security requirements into architecture blueprints and implementation plans
  • Strong understanding of delivery governance, risk management, dependencies, and quality assurance for enterprise security transformations
  • Limited sponsorship may be available

Preferred:

  • Familiarity with crypto-agility strategies and post-quantum cryptography readiness

  • Knowledge of adjacent domains such as IAM, PAM, secrets management, zero trust, and machine identity management

  • Experience with DevSecOps integration, CI/CD pipeline enablement, and API-driven automation

  • Working knowledge of Python, PowerShell, Bash, REST APIs, or infrastructure automation patterns

  • Understanding of cloud-native certificate and key services in AWS, Azure, and GCP

  • Awareness of regulatory, audit, and policy requirements impacting cryptographic controls

  • Experience with operating model design, service transition, and support model definition

  • Ability to support business development, solutioning, estimation, staffing, and proposal writing

  • Strong mentoring capability for junior practitioners and emerging technical leads

  • Comfort with executive-level reporting, issue escalation, and steering committee discussions

The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $144,200 - 265,600.

You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.

About the company

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

Apply for this position