

Share
Integrated Risk Management (IRM) Managed Services Center Senior Analyst (Senior)
The risk landscape is continuously changing due to market volatility, geopolitical crises, wide-spread economic changes, regulatory reforms and cyber threats. As a result, organizations look to us to transform their approach to risk to turn it in a means to not only protect the enterprise but create value.
Clients retain IRM Managed Services to assist them with transforming their risk functions and providing operational support for technology solutions to provide the executive leadership with valuable insight for decision making. As an IRM professional you will belong to a globally connected team of specialists delivering services from our Dallas Service Center.
Your Key Responsibilities
As a member of our IRM service center, you will be part of a specialized team supporting the delivery of risk and technology solutions on Governance, Risk, and Compliance (GRC) platforms such as Archer Technologies and Service Now.
Skills and Attributes for Success
To qualify for the role, you must have
Ideally, you’d also have
What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .
These jobs might be a good fit

Share
Job Description:
Job Description:
This job is responsible for influencing and driving optimal bank-wide liquidity strategies by Lines of Business (LOBs) and legal entity in business as usual (BAU) and stress scenarios. Key responsibilities include overseeing and influencing liquidity utilization across the organization and providing input into process and control designs, operational risk mitigation, issue management, automation, and other initiatives across the bank.
Responsibilities:
Required Qualifications:
Desired Qualifications:
Skills:
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
Your Experience
We define the industry, instead of waiting for directions. We need individuals who feel comfortable in ambiguity, excited by the prospect of a challenge, and empowered by the unknown risks facing our everyday lives that are only enabled by a secure digital environment.
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $0 - $0/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Impact
Serve as a key contributor to the development, maturation, and innovation of Unit 42’s cloud security consulting services.
Lead and deliver complex cloud security assessments covering architecture, configuration, identity, monitoring, and threat detection across AWS, Azure, GCP, and hybrid/multi-cloud environments.
Evaluate cloud network architectures, including perimeter protections, VPC/VNet segmentation, API gateways, ingress/egress controls, and cloud-native security services.
Analyze cloud logging, telemetry, and monitoring coverage; identify gaps in detection and alerting; and provide actionable recommendations to improve visibility, SIEM/XDR integration, and threat-hunting effectiveness.
Assess cloud identity and access management (IAM) design, including federation, least privilege models, role delegation, conditional access, privilege escalation paths, and MFA enforcement across cloud providers.
Utilize cloud-native CLIs, SDKs, and APIs to perform deep technical validation of configurations, controls, and security posture.
Assess multi-cloud and hybrid-cloud deployments by reviewing interoperability, dependencies, and security impacts between cloud services and on-prem infrastructure.
Develop strategic cloud security roadmaps that align technical recommendations with a client’s broader business objectives, resource constraints, and long-term security transformation initiatives.
Integrate Palo Alto Networks cloud platforms (Prisma Cloud, Prisma SASE, Cortex XSIAM, and Precision AI) into consulting engagements to drive differentiated value and help customers enhance their security posture.
Engage with prospective clients in a pre-sales capacity to uncover cloud security pain points, evaluate architectural weaknesses, and position Unit 42 solutions to key outcomes.
Support delivery teams in overcoming technical objections and effectively tying cloud security recommendations to business risk, operational impact, and customer strategic goals.
Build and maintain long-term executive relationships, serving as a trusted strategic advisor for cloud security and Zero Trust transformation initiatives.
Lead the development and delivery of cloud security enablement content to elevate consulting capabilities across Unit 42.
Partner with Palo Alto Networks product development teams to provide structured feedback on features, customer patterns, and cloud security trends that influence the roadmap and delivery experience.
Your Experience
4+ years of experience performing cloud security advisement and risk assessments based upon industry-accepted standards
6+ years of professional services and consulting experience and 3+ years of Director (or and equivalent Senior Manager) experience leading consulting delivery teams is highly preferred
Experience managing a diverse team of business and technical consultants
Cloud Security-related certifications preferred
Hands-on experience with a cloud hosting provider (AWS, Azure, GCP, etc).
Deep experience within the cloud native application protection platform (CNAPP) technology or advisory/consulting space.
Strong fluency in the application of Virtual Machines, SaaS, IaaS, PaaS, FaaS and other public cloud technical infrastructure concepts.
Possess a deep technical knowledge in Cloud Platforms and the dependencies around such an environment (WAF, SSO, Cloud Threats, API Security, Cloud Security Posture Management)
Former experience with cloud migrations (cloud to cloud, or on-prem to cloud)
Knowledge of the technical nuances related to SD-WAN and SASE solutions and their application to Cloud Environment access solutions.
10+ years in developing, strengthening and expanding client relationships
Knowledge of how to integrate command-line interfaces or scripting tools as a part of a risk assessment or remediation in cloud environments is a plus.
Rich understanding of how Enterprise’s use and struggle using infrastructure as code and continuous integration tools such as Ansible, Chef, Jenkins, Kubernetes, Packer, Pulumi, Puppet, Saltstack and Terraform or CSP tools such as CloudFormation, Resource Manager or Deployment Manager.
Ability to scope new opportunities with prospective clients, including drafting statements of work and proposals
Ability to perform travel requirements as needed to meet business demands (on average 25%)
Bachelor’s Degree in Information Security, Computer Science, Digital Forensics, Cyber Security OR equivalent years of professional experience to meet job requirements and expectations
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $183000/YR - $252000/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Being the cybersecurity partner of choice, protecting our digital way of life.
Your Career
As a Product Marketing Manager at Palo Alto Networks, you will play a key role in planning and executing the product marketing strategy for our data security offerings. You will be the expert, voice, and go-to-market driver for Palo Alto Networks’ data security capabilities. You will drive positioning, messaging, content creation, and sales enablement for the product line that you are responsible for. You will work closely with stakeholders from product management, sales, field marketing, and technology partners to develop and execute your strategy and advance our mission.
Your Impact
Apply your data security knowledge to translate product capabilities into simple, compelling messages and tools that resonate with customers, with a clear understanding of the target markets and buyer personas
Work closely with Product Management to build a shared market and product vision, and a cooperative relationship that forms the foundation of all product marketing activities
Author compelling, high-quality content, both at a business and a technical level, in a variety of formats including print, web, social media, and video. You like to write and present
Launch products and collaborate with field teams to execute marketing campaigns; be a subject matter expert and a go-to resource for the sales and field marketing teams
Effectively work at building and executing plans that cross different functional groups, including product management, business development, and sales
Represent the company in customer engagements and at events, to evangelize our point of view
Track the data security market and competitive landscape in collaboration with product, marketing, and sales leadership
Your Experience
5+ years of product marketing experience ideally with 3+ years in data security or adjacent cybersecurity solutions..
An understanding of data security technologies, market trends, competitive landscape, and customer requirements is desirable
Outstanding verbal and written communication skills
Comfortable with creating and delivering presentations in a range of environments, from industry conferences to customer briefings
Demonstrated record of working cross-functionally to drive sales, demand generation, and overall organization and business success
Experience and innovative energy to champion successful market and competitive disruption initiatives
Bachelor’s degree required, Technical degree or equivalent background or equivalent military experience is desirable
Compensation Disclosure
The compensation offered for this position will depend on qualifications, experience, and work location. For candidates who receive an offer at the posted level, the starting base salary (for non-sales roles) or base salary + commission target (for sales/commissioned roles) is expected to be between $131,000 - $212,500/YR. The offered compensation may also include restricted stock units and a bonus. A description of our employee benefits may be found .
All your information will be kept confidential according to EEO guidelines.
These jobs might be a good fit

Share
Job Description:
Job Description:
This job is responsible for handling complex and escalated customer situations regarding possible fraudulent account activity. Key responsibilities include receiving inbound calls and takes appropriate action requiring accuracy on complex transactions. Job expectations include performing functions related to research and resolution of fraudulent activity, service support, and delivering practical, innovative solutions to clients while focusing on retention and re-establishing client confidence.
Wealth Management Fraud & Claims associates will handle inbound calls from clients, branch offices, banking centers, and various internal associates. They will also be responsible for the claim initiation and status updates of various fraud and billing disputes, on our clients’ bank accounts. Associates will handle a wide variety of claim types including but not limited to: credit card, debit card, ATM, check fraud, ACH, and online wire transfers for wealth banking products.
Responsibilities:
* 1st and 2nd shifts available : Tuesday through Saturday : 10:00 am EST to 8:00 pm EST flexibility
Required Qualifications:
Desired Qualifications:
Skills:
High School Diploma / GED / Secondary School or equivalent
1st shift (United States of America)These jobs might be a good fit

Share
LOB Overview:
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank’s Information Security strategy and policy, manages the Information Security program, identifies, and addresses vulnerabilities and operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
Role Description:
The Mainframe Security Administration Manager leads a team of analysts responsible for managing secure access to mainframe systems. This role requires a blend of technical acumen in mainframe security mechanisms (RACF, ACF2, Top Secret), strong governance expertise including knowledge of industry standards, and leadership of team members as a key stakeholder within Information Security and the broader IT organization.
Access Control Management
Implement and maintain security administration and access policies using RACF, ACF2, or Top Secret.
Enforce least privilege and role-based access control (RBAC).
Ensure multi-factor authentication for privileged users.
Ensure that privileged access and encryption policies are enforced.
Compliance & Auditing
Align security administration and access controls with regulatory frameworks (SOX, UCAL and PWC applications).
Maintain detailed logs and audit trails for all access request and administrators provisioning activities.
Utilize tools such as Vanguard Resource Administrator (VRA) for forensic analysis and Report Analyzer for reporting.
Security Governance
Monitor for unauthorized access and potential data leakage.
Conduct regular access reviews and security assessments.
Integrate with Identity and Access Management (IAM) systems for centralized governance.
Team Management
Lead and mentor a team of mainframe security analysts.
Ensure team proficiency in RACF, Top Secret, and z/OS environments, including by participating in learning opportunities and communicating with vendors
Promote automation of repetitive provisioning tasks to enhance efficiency.
Oversee ticketing systems integrated with IAM workflows for request tracking, Quality Assurance validation for efficiency and remediation.
Training & Development
Provide ongoing training on evolving security threats and compliance requirements, process changes.
Set Global Information Security goals and encourage professional certifications (e.g., CISSP, Certified RACF and Vanguard Specialist).
Operational Best Practices
Ensure 24/7 monitoring of access provisioning activities.
Establish and maintain incident response protocols for access-related events.
Design scalable provisioning processes to support organizational growth.
Required Qualifications:
10+ years of progressive experience in Identity and Access Management, with a strong focus on access provisioning across enterprise environments.
10+ Years of experience in RACF, ACF2 and zOS systems
Drives Mainframe Modernization and work in close partnership with the CTO Mainframe team to provide SME security leadership.
Deep technical expertise in Mainframe RACF, Vanguard and Microsoft Azure AWS, Databases DB2 and VMSecure and enterprise storage platforms.
Proven ability to design, implement, and manage access provisioning solutions that enforce least privileged access and align with regulatory and internal compliance requirements.
Strong understanding of IAM governance frameworks, platforms (e.g., ForgeRock Single Sign- On SSO, Adaptive Authentication) role-based access control (RBAC), group policy management, and privileged access management (PAM) tools, CyberArk, Hashi Corp and Beyond Trust.
Experience with automated provisioning/de-provisioning workflows, including integration with HR systems to demonstrated proficiency in scripting and automation (e.g., PowerShell, Python) to support scalable access provisioning and audit processes.
Familiarity with cloud infrastructure security and access controls in hybrid environments, particularly within Microsoft Azure AWS and Oracle Cloud.
Ability to conduct access reviews, entitlement audits, and risk assessments to identify and remediate access-related vulnerabilities.
Excellent analytical, problem-solving, and communication skills, with the ability to collaborate across technical and business teams.
Bachelor’s degree in computer science, Information Security, or a related field; advanced degree or certifications (e.g., CISSP, CISM, Microsoft Certified: Identity and Access Administrator Associate) preferred.
BS/BA Engineering degree or equivalent experience
Desired Skills:
Understanding or have experience with agile and lean philosophies.
Strong critical thinking and problem-solving skills with clear communication
Ability to collaborate with different roles to achieve common goals.
Ability to think critically and question the status quo.
Understand how to identify software security vulnerabilities and recognize and communicate their associated impact to the business.
Demonstrate awareness of secure software design principles such as least privilege, defense in depth, or designing secure user interfaces
These jobs might be a good fit

Share
Integrated Risk Management (IRM) Managed Services Center Senior Analyst (Senior)
The risk landscape is continuously changing due to market volatility, geopolitical crises, wide-spread economic changes, regulatory reforms and cyber threats. As a result, organizations look to us to transform their approach to risk to turn it in a means to not only protect the enterprise but create value.
Clients retain IRM Managed Services to assist them with transforming their risk functions and providing operational support for technology solutions to provide the executive leadership with valuable insight for decision making. As an IRM professional you will belong to a globally connected team of specialists delivering services from our Dallas Service Center.
Your Key Responsibilities
As a member of our IRM service center, you will be part of a specialized team supporting the delivery of risk and technology solutions on Governance, Risk, and Compliance (GRC) platforms such as Archer Technologies and Service Now.
Skills and Attributes for Success
To qualify for the role, you must have
Ideally, you’d also have
What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .
These jobs might be a good fit