drjobs Backfill

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Delhi - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

At EY youll have the chance to build a career as unique as you are with the global scale support inclusive culture and technology to become the best version of you. And were counting on your unique voice and perspective to help EY become even better too. Join us and build an exceptional experience for yourself and a better working world for all.

EY Technology Security Consultant
Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 350000 people in more than 140 countries all of whom rely on secure technology to be able to do their job every single day. Everything from the laptops we use to the ability to work remotely on our mobile devices and connecting our people and our clients to enabling hundreds of internal tools and external solutions delivered to our clients. Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

EY Technology supports our technology needs through three business units:

Client Technology (CT) focuses on developing new technology services for our clients. It enables EY to identify new technologybased opportunities faster and pursue those opportunities more rapidly.
Enterprise Technology (ET) ET supports our Core Business Services functions and will deliver fitforpurpose technology infrastructure at the cheapest possible cost for quality services. ET will also support our internal technology needs by focusing on a better user experience.
Information Security (InfoSec) Info Sec prevents detects responds and mitigates cyberrisk protecting EY and client data and our information management systems.

The opportunity
As a Security Consultant Lead within EYs internal Global Information Security team the individual will be a trusted security advisor to the Client Technology Platforms Delivery organization within IT Services. The Client Technology Platforms delivery organization is responsible for endtoend delivery of technology programs and projects supporting EYs service lines including delivery of a global managed services platform Big Data and analytics solutions as well as individual line of business solutions and services. This role will directly engage in supporting a team of architects engineers and product managers for delivery on programs and projects defining security risks and controls providing security guidance identifying and prioritizing securityrelated requirements promoting securebydefault designs and facilitating delivery of information security services throughout the system development life cycle (SDLC). The role will also develop and directly communicate appropriate risk treatment and mitigation options to address security vulnerabilities translated into businessoriented terminology for communicating risk to business stakeholders.

Your key responsibilities
Support a technical team with a focus on the following responsibilities:

  • Review security architectures and provide pragmatic security guidance that balance business benefit and risks.
  • Engage IT project teams throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls
  • Perform threat modeling and risk assessments of information systems applications and infrastructure
  • Maintain Information Security Policies and Compliance standards and enhance the InfoSec risk assessment and certification methodologies
  • Define security configuration standards for shared and multitenant platforms and technologies
  • Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
  • Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stakeholders
  • Provide knowledge sharing and technical assistance to other team members
  • Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible services and technology portfolios

Skills and attributes for success
Significant working security experience and knowledge in the design implementation and operation of security controls in one of the following areas:

  • Cloud Security Technical understanding of virtualization cloud infrastructure and public cloud offerings and experience designing security configuration and controls within cloudbased solutions e.g. Microsoft Azure and Azure PAAS services or another cloud platform (GCP AWS IBM AliCloud etc.
  • Infrastructure Security Experience with the integration of cloud native infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management Web Application Firewalls (WAFs) Application and API Gateways intrusion detection and prevention security monitoring and data encryption solutions.
  • Application Security Experience with the design and testing of security controls for multitier business solutions including the design of applicationlevel access and entitlement management data tenancy and isolation encryption and logging. Working familiarity with REST API and microservices architecture.
  • Agile & DevSecOps Methodologies Experience promoting automated security features in pipelines and security testing as a central feature in Agile workflows as a contributing member within an Agile development or DevOps environment.

Although not required it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:

  • Operational Security Experience with defining operational security models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.
  • Information Security Standards Knowledge of common information security standards such as: ISO 27001/27002 CSA and CIS Controls NIST CSF PCI/DSS FEDRAMP.
  • Product Management working with broader business and technology teams on aspects of security that affect all phases of PI Planning from concept to design to implementation and then operational support.
  • Identity and Access Management Experience with Azure Active Directory (AAD) based Identity and Access Management and Authorization design and integration with API IDaaS and Federation technologies.

To qualify for the role you must have:

  • Advanced degree in Computer Science or a related discipline; or equivalent work experience.
  • Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP CISM or CISA or similar cloudsecurity oriented certifications.
  • Nine or more years of experience in the management of a significant Information Security risk management function
  • Experience in managing the communication of security findings and recommendations to IT project teams business leadership and technology management executives


EY Building a better working world



EY exists to build a better working world helping to create longterm value for clients people and society and build trust in the capital markets.



Enabled by data and technology diverse EY teams in over 150 countries provide trust through assurance and help clients grow transform and operate.



Working across assurance consulting law strategy tax and transactions EY teams ask better questions to find new answers for the complex issues facing our world today.

Employment Type

Full Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.