Jump to content

COMPLETE Security Consultant

13 days ago


 Share

Job Opportunity Details

Type

Full Time

Salary

Not Telling

Work from home

No

Weekly Working Hours

Not Telling

Positions

Not Telling

Working Location

Gurgaon, Gurgaon, HR, 122010, India   [ View map ]

Job Description

At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all. 

 

 

 

 

Business Security Consultant

 

EY Technology:

Technology has always been at the heart of what we do and deliver at EY. We need technology to keep an organization the size of ours working efficiently. We have 250,000 people in more than 140 countries, all of whom rely on secure technology to be able to do their job every single day.  Everything from the laptops we use, to the ability to work remotely on our mobile devices and connecting our people and our clients, to enabling hundreds of internal tools and external solutions delivered to our clients.  Technology solutions are integrated in the client services we deliver and is key to us being more innovative as an organization.

EY Technology supports our technology needs through three business units:

Client Technology (CT) - focuses on developing new technology services for our clients. It enables EY to identify new technology-based opportunities faster, and pursue those opportunities more rapidly.

Enterprise Workplace Technology (EWT) – EWT supports our Core Business Services functions and will deliver fit-for-purpose technology infrastructure at the cheapest possible cost for quality services. EWT will also support our internal technology needs by focusing on a better user experience.

Information Security (Info Sec) - Info Sec prevents, detects, responds and mitigates cyber-risk, protecting EY and client data, and our information management systems.  

The opportunity

 

The Security Consultant reports to Deputy CISO for Client Technology in a hands-on role focused on the security architecture and design for applications processes sensitive data and providing critical business services.  The architect works directly with Architects, Developers, IAM engineers and other resources through collaboration and mentoring to deliver business solutions.

The Security Consultant’s role is a technical position which will support the development of security strategies and architecture vision as it relates to the design, build, deployment and operation of business applications and related infrastructure in support of Firm growth strategy.

 

Your key responsibilities

This position is an individual contributor capable of supporting multiple project teams in the design, implementation and certification of security controls across IT systems.  This requires knowledge of various IT system architecture and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards.  Also should have knowledge of 3rd Party security assessments and applicability of SOC1 and SOC2 reports and concepts of vendor risk management.

 

Skills and attributes for success

  • Significant working security experience and knowledge in the design, implementation and operation of security controls in one of the following areas:
  • Agile & DevOps Methodologies – Experience as a contributing member of a balanced team within an Agile development or DevOps environment.
  • Application Security - Experience with the design of security controls for multi-tier business solutions including the design of application-level access and entitlement management, data tenancy and isolation, encryption, and logging. Working familiarity with REST API and microservices architecture.
  • Cloud Security –Technical understanding of virtualization, cloud infrastructure, and public cloud offerings and experience designing security configuration and controls within cloud based solutions in Microsoft Azure and Azure PAAS services
  • Infrastructure Security – Experience with the integration of common infrastructure security technologies and solutions into business solution architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions.
  • Identity and Access Management - Active Directory based Identity and Access Management and Authorization design experience and integration with IDaaS and Federation technologies.

 

To qualify for the role you must have

  • Direct knowledge of various IT system architecture concepts and Cloud technology, as well as supporting technology such as IAM, network security, firewalls, user account management, audit and logging, and other security concepts as outlined in ISO27001, OWASP and related security standards.
  • Advanced degree in Computer Science or a related discipline; or equivalent work experience.  CISSP, CISM, or similar certifications preferred.
  • Strong communication skills and ability to work with stakeholders ranging from developers to architects to business leaders.

 

Ideally, you’ll also have

Although not required, it is preferred that candidates possess additional working security experience and knowledge in one or more of the following areas:

  • Operational Security – Experience with defining operational models and procedures for business solutions including the operation and maintenance of infrastructure and application security controls.
  • Information Security Standards – Knowledge of common information security standards such as: ISO 27001/27002, NIST CSF, FEDRAMP, CSA and CIS Controls.
  • Product Management – working with a broader business team on aspects of security that affect all phases from concept to design to implementation and then operational support.

 

What we look for

We are looking for individuals with a passion for information security and demonstrated ability to apply their knowledge to new and emerging technologies that are supporting the growth strategy of a global professional services firm. 

 

What working at EY offers

We offer a competitive remuneration package where you’ll be rewarded for your individual and team performance. Our comprehensive Total Rewards package includes support for flexible working and career development, and with FlexEY you can select benefits that suit your needs, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions. Plus, we offer:

 

  • Support, coaching and feedback from some of the most engaging colleagues around
  • Opportunities to develop new skills and progress your career
  • The freedom and flexibility to handle your role in a way that’s right for you

 

EY is committed to being an inclusive employer and we are happy to consider flexible working arrangements. We strive to achieve the right balance for our people, enabling us to deliver excellent client service whilst allowing you to build your career without sacrificing your personal priorities. While our client-facing professionals can be required to travel regularly, and at times be based at client sites, our flexible working arrangements can help you to achieve a lifestyle balance.

 

 

 

 

 

EY | Building a better working world 


 
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.  


 
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.  


 
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.  


More Information

Application Details

  • Organization Details
    Ernst & Young
 Share


User Feedback

Recommended Comments

There are no comments to display.

Join the conversation

You are posting as a guest. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Add a comment...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...