Search jobs now Find the right job type for you Explore how we help job seekers Contract talent Permanent talent Project and interim professionals Learn how we work with you Executive search Technology Finance and accounting Financial services Business transformation & IT leadership Human resources Supply chain Technology Risk, audit and compliance Finance and accounting Digital, marketing and customer experience Legal Operations Human resources 2025 Salary Guide Robert Half blog Salary and hiring trends Adaptive working Competitive advantage Work/life balance Workforce transformation Browse jobs Find your next hire Our location
IT Consultant
<p>Security Governance</p><ul><li>Security Education: Support security awareness measures targeting risks associated with the use of generative AI, such as information leaks, unauthorized data entry, and model abuse. We create educational content, plan and implement employee training, assess understanding, and propose improvements.</li><li>NIS2 Directive Compliance: Evaluate governance, risk management, incident reporting systems, supply chain security, and more. Implement management measures, operational processes, and management responsibility systems based on NIS2 requirements.</li></ul><p>Engineering</p><ul><li>Device authentication: Utilizes device certificates, MDM integration, and hardware-based identification information (TPM, etc.) to help prevent access from unauthorized or unregistered devices.</li><li>Strengthening remote access security: Based on zero trust, supports the implementation of MFA, device authentication, network isolation, and access control policy optimization.</li><li>Strengthening security of AD domain and PC local administrator privileges: Minimizing privileged accounts, deleting unnecessary accounts, protecting authentication information, and centralizing local administrator password management using LAPS, etc. Support for reducing the risk of privilege abuse and authentication information leakage.</li></ul><p>Application</p><ul><li>Strengthening authentication methods: Review authentication methods and help reduce the risk of unauthorized logins and credential leaks.</li><li>Support for strengthening cloud security: Support for the implementation and operation of CSPM. Detecting configuration errors, visualizing compliance violations, vulnerability management, continuous monitoring, etc.</li><li>Support for standardizing password and secret management and implementing remote support solutions: Protecting privileged accounts and application secrets, implementing vault management, and supporting the establishment of regular rotation operations, etc. Support for the implementation of remote support solutions.</li></ul><p>SecOps</p><ul><li>Sentinel POC and Microsoft security infrastructure development: Strengthening access with Entra ID, integrating protection and detection with Defender, and supporting the implementation and operation of SIEM/SOAR with Sentinel.</li><li>AI-based security process automation: Leveraging AI technology to support the automation of operational processes such as security monitoring, incident response, threat analysis, and TPRM.</li><li>Evilginx implementation and operation support: Building, configuring, and operating the Evilginx environment, providing the environment necessary for verifying phishing attack methods, and providing technical support.</li></ul><p> </p><p>Reference No.: 06940-0013322943</p><p><em>By clicking 'apply', you give your express consent that Robert Half may use your personal information to process your job application and to contact you from time to time for future employment opportunities. For further information on how Robert Half processes your personal information and how to access and correct your information, please read the Robert Half privacy notice <a href="https://www.roberthalf.com/jp/en/privacy" target="_blank">https://www.roberthalf.com/jp/en/privacy</a>. Please do not submit any sensitive personal data to us in your resume (such as such as race, beliefs, social status, medical history or criminal record) as we do not collect your sensitive personal data at this time.</em></p><hr /><p>お客様が「今すぐ応募」ボタンをクリックすることにより、ロバート・ハーフ(以下、当社)がお客様の応募内容を処理し、求人情報を今後随時ご連絡する目的で個人情報を使用することに明示的に同意ただいたこととなります。当社による個人情報の処理方法、またお客様自身の個人情報へのアクセスおよびその訂正に関する詳細については、プライバシー規約(<a href="https://www.roberthalf.com/jp/ja/privacy">https://www.roberthalf.com/jp/ja/privacy</a>)をお読みください。当社は、要配慮個人情報はお預かりしておりませんので人種、信条、社会的身分、病歴、犯罪の経歴など、取扱いに特に配慮を要する個人情報は、ご提出いただく職務経歴書・レジュメ等に含めないようお願いいたします。</p><img src="https://counter.adcourier.com/bHVrZS5mdXJuaXZhbC42ODQzMC4xMDg5OEByaGlqcC5hcGxpdHJhay5jb20.gif">
  • Tokyo,
  • remote
  • Contract
  • 9.0M - 9.1M JPY / Yearly
  • <p>Security Governance</p><ul><li>Security Education: Support security awareness measures targeting risks associated with the use of generative AI, such as information leaks, unauthorized data entry, and model abuse. We create educational content, plan and implement employee training, assess understanding, and propose improvements.</li><li>NIS2 Directive Compliance: Evaluate governance, risk management, incident reporting systems, supply chain security, and more. Implement management measures, operational processes, and management responsibility systems based on NIS2 requirements.</li></ul><p>Engineering</p><ul><li>Device authentication: Utilizes device certificates, MDM integration, and hardware-based identification information (TPM, etc.) to help prevent access from unauthorized or unregistered devices.</li><li>Strengthening remote access security: Based on zero trust, supports the implementation of MFA, device authentication, network isolation, and access control policy optimization.</li><li>Strengthening security of AD domain and PC local administrator privileges: Minimizing privileged accounts, deleting unnecessary accounts, protecting authentication information, and centralizing local administrator password management using LAPS, etc. Support for reducing the risk of privilege abuse and authentication information leakage.</li></ul><p>Application</p><ul><li>Strengthening authentication methods: Review authentication methods and help reduce the risk of unauthorized logins and credential leaks.</li><li>Support for strengthening cloud security: Support for the implementation and operation of CSPM. Detecting configuration errors, visualizing compliance violations, vulnerability management, continuous monitoring, etc.</li><li>Support for standardizing password and secret management and implementing remote support solutions: Protecting privileged accounts and application secrets, implementing vault management, and supporting the establishment of regular rotation operations, etc. Support for the implementation of remote support solutions.</li></ul><p>SecOps</p><ul><li>Sentinel POC and Microsoft security infrastructure development: Strengthening access with Entra ID, integrating protection and detection with Defender, and supporting the implementation and operation of SIEM/SOAR with Sentinel.</li><li>AI-based security process automation: Leveraging AI technology to support the automation of operational processes such as security monitoring, incident response, threat analysis, and TPRM.</li><li>Evilginx implementation and operation support: Building, configuring, and operating the Evilginx environment, providing the environment necessary for verifying phishing attack methods, and providing technical support.</li></ul><p> </p><p>Reference No.: 06940-0013322943</p><p><em>By clicking 'apply', you give your express consent that Robert Half may use your personal information to process your job application and to contact you from time to time for future employment opportunities. For further information on how Robert Half processes your personal information and how to access and correct your information, please read the Robert Half privacy notice <a href="https://www.roberthalf.com/jp/en/privacy" target="_blank">https://www.roberthalf.com/jp/en/privacy</a>. Please do not submit any sensitive personal data to us in your resume (such as such as race, beliefs, social status, medical history or criminal record) as we do not collect your sensitive personal data at this time.</em></p><hr /><p>お客様が「今すぐ応募」ボタンをクリックすることにより、ロバート・ハーフ(以下、当社)がお客様の応募内容を処理し、求人情報を今後随時ご連絡する目的で個人情報を使用することに明示的に同意ただいたこととなります。当社による個人情報の処理方法、またお客様自身の個人情報へのアクセスおよびその訂正に関する詳細については、プライバシー規約(<a href="https://www.roberthalf.com/jp/ja/privacy">https://www.roberthalf.com/jp/ja/privacy</a>)をお読みください。当社は、要配慮個人情報はお預かりしておりませんので人種、信条、社会的身分、病歴、犯罪の経歴など、取扱いに特に配慮を要する個人情報は、ご提出いただく職務経歴書・レジュメ等に含めないようお願いいたします。</p><img src="https://counter.adcourier.com/bHVrZS5mdXJuaXZhbC42ODQzMC4xMDg5OEByaGlqcC5hcGxpdHJhay5jb20.gif">
  • 2025-11-14T04:05:48Z

It Consultant Job in Tokyo | Robert Half