Expoint – all jobs in one place
Finding the best job has never been easier

Sap Security Consultant jobs

With Expoint, the dream vaccancy is waiting for you around the corner. Jobs as Sap Security Consultant, is this the job you are looking for? We definitely have a Sap Security Consultant job with your name on it.
Company
Job type
Job categories
Job title (1)
United States
State
City
6,547 jobs found
Yesterday
EY

EY Chief Information Security Officer CISO - US Government & Pu... United States, Virginia, Arlington

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
Description:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
Yesterday
EY

EY Risk Consulting - Technology Oracle Senior Consultant United States, New York, New York

Limitless High-tech career opportunities - Expoint
You will leverage your proven track record of cloud-based application experience, technical knowledge, and strong interpersonal skills, to effectively deliver quality results in the assessment, design, and implementation of controls,...
Description:

In today's business landscape organizations are continuously transforming and evolving to keep pace with change and innovative solutions. This wave of digital transformation and constant evolution introduces a variety of risks, which organizations are not equipped to manage and mitigate on their own. As a professional in our Risk Technology practice, you will assist clients in integrating optimal application security, control, and risk management solutions through their transformation journey. You will belong to an international network of specialists helping our clients enable trust through transformation, while working closely with large scale implementation teams across a variety of enabling emerging technologies and solutions.

As a member of our national Risk Technology practice, you will belong to a network of professionals helping our clients implement trusted technology solutions to enrich and improve decision making, provide visibility and transparency of risk and compliance to stakeholders, and integrate efficient and effective risk management solutions.

As our Risk Technology practice continues to rapidly expand, we are seeking a highly motivated Senior Associate, focused on cloud-based application security, controls, and technology enablement. We need Seniors to help our clients develop and execute sustainable risk management solutions through transformational their efforts. As part of the team, you will work with a wide variety of resources and clients to deliver professional services on strategic and global priority accounts, while accelerating your professional growth.

We will support you with career focused training and coaching to develop, execute, and accelerate your professional goals.

Your key responsibilities

Leveraging your cloud application and industry knowledge, you will lead cross-functional teams in developing innovative solutions for clients that will assist them in evolving and sustaining a risk management program through transformation. You will support EY teams responsible for transforming organizations' front, middle, and back office through implementation of leading practice cloud-based technology solutions.

Skills and attributes for success

  • You will leverage your proven track record of cloud-based application experience, technical knowledge, and strong interpersonal skills, to effectively deliver quality results in the assessment, design, and implementation of controls, security, and risk management solutions.
  • Deliver facts, analyses, and recommendations in an accurate, clear, and concise manner.
  • Foster relationships with client personnel at appropriate levels
  • Drive high-quality work products on your team within expected timeframes and budget

To qualify for the role, you must have

  • A bachelor’s or master’s degree and approximately 2-3 years of related work experience
  • Demonstrate a deep understanding of business processes across one or many cloud base applications (e.g., purchase-to-pay, hire-to-retire, customer-to-contract), technical application security design and configuration, application role maintenance and user provisioning processes.
  • Internal controls within and around the Oracle or cloud-based applications
  • Oracle Applications security and how to achieve a design that enables an end user but also establishes control.
  • Advanced project management and client service skills
  • Excellent teaming skills
  • A valid driver’s license in the US and a valid passport required; willingness and ability to travel both domestically and internationally to meet client needs

Ideally, you’ll also have

  • Experience integrating, managing, or assessing security and controls for cloud-based applications.
  • ERP implementation project management and support experience (Oracle and/or Workday experience is a plus)
  • Industry related certification (e.g., CISA, PMP, CIA, RICS); non-certified hires are required to become certified within 1 year from the date of hire

What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $102,500 to $187,900. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $122,900 to $X213,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

These jobs might be a good fit

Yesterday
EY

EY SAP - EWM IM 3PL Senior Consulting Location OPEN United States, Texas, Houston

Limitless High-tech career opportunities - Expoint
Interacting with business stakeholders to evaluate business models and processes. Analyzing newly implemented technology solutions to verify they meet business requirements. Collaborating with technical teams to design and deliver system...
Description:

Our SAP Logistics team provides strategic solutions that transform logistics operations, enhancing cost efficiency, quality, and effectiveness. In this role, you will assist clients in integrating their SAP ERP systems with third-party logistics (3PL) warehouse management systems (WMS) and non-SAP legacy or best-of-breed WMS applications.

As a Senior Technology Analyst, you will play a pivotal role in bridging the gap between business needs and technical solutions. You will interact with business stakeholders to gather and analyze requirements, ensuring that newly implemented technology solutions meet their needs. Your collaboration with technical teams will be essential in designing and delivering effective system architecture solutions.

Your key responsibilities

In this role, you will spend your time engaging with clients and internal teams to ensure successful project delivery. You will face challenges that require analytical thinking and problem-solving skills, providing you with opportunities to learn and grow in a dynamic environment. This position may require regular travel to meet with clients, allowing you to build relationships and understand their needs better. Key responsibilities include:

  • Interacting with business stakeholders to evaluate business models and processes.
  • Analyzing newly implemented technology solutions to verify they meet business requirements.
  • Collaborating with technical teams to design and deliver system architecture solutions.
  • Participate in Explore phase design workshops.
  • Perform configuration of SAP Inventory Management, Logistics Execution, ALE and other related SAP modules.
  • Design interfaces and integration between SAP and external WMS applications.
  • Design custom RICEF solutions and document functional specifications.
  • Perform testing of solutions.
  • Support development and delivery of training materials.
  • Provide on-site hyper-care support to client / 3PL warehouse users.
  • Demonstrate in-depth technical capabilities and possess strong business acumen. Demonstrate ability to assimilate new knowledge.
  • Consistently deliver quality client services. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes.
  • Establish relationships with client personnel at appropriate levels.

Skills and attributes for success

To excel in this role, you will need a combination of technical and interpersonal skills. Your ability to build relationships and communicate effectively will be crucial.

On your typical engagement, you will work with the key stakeholders to understand their needs and advise on SAP system capabilities. You will initiate the requirement gathering, architect solutions, blueprinting, testing, complete the workflow and documentation, as well as the functional design of the solution. Additionally, you will liaise with stakeholders and technical team to translate requirements into business solutions and complete the configurations and integrations with both SAP and non-SAP systems. The following skills and attributes will have a significant impact:

  • Strong analytical and decision-making abilities.
  • Proficiency in technology business requirements definition and analysis.
  • Experience in system configuration design and technology cost-benefit analysis.
  • Ability to manage client relationships and communicate with impact.

To qualify for the role, you must have

  • A bachelor’s degree required.
  • Typically, no less than 2 - 4 years of experience working with SAP logistics solutions involving external WMS integration
  • Strong technical skills in application functional design.
  • Expertise in technology business requirements definition, analysis, and mapping.
  • Skills in training design and delivery.
  • Ability to build and manage relationships effectively.
  • A flexibility and willingness to travel to meet client needs; travel is estimated at 40-60%

Ideally, you’ll also have

  • Prior consulting industry experience or deep functional experience
  • SAP certification(s).
  • Experience with at least one full lifecycle implementation of SAP S/4.
  • Experience with at least one full lifecycle integration an external WMS with SAP.
  • Experience with EDI messaging, specifically messages 846, 856, 888, 940, 943, 944, 945 and 947, and/or X12 or EDIFACT equivalents.
  • Experience with API integration into non-SAP WMS solutions.
  • Experience performing hands-on SAP system configuration.
  • Experience with configuring SAP logistics execution (delivery-related configuration) and Materials Management (inventory management and physical inventory configuration).
  • Experience designing custom RICEF solutions and writing functional specifications.
  • Experience writing and executing test scripts.
  • Experience writing and delivering training materials for end users.
  • Knowledge and understanding of warehouse operations for distribution and manufacturing facility operations.

What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $102,500 to $187,900. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $122,900 to $213,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

These jobs might be a good fit

Yesterday
EY

EY SAP - Production Planning Digital Manufacturing United States, Texas, Houston

Limitless High-tech career opportunities - Expoint
Requisition Id : 1625670Our Global Government & Public Sector (GPS) is a network of highly skilled professionals bestowed to serving our clients by bringing best in class international experience and...
Description:

Requisition Id : 1625670

Our Global Government & Public Sector (GPS) is a network of highly skilled professionals bestowed to serving our clients by bringing best-in-class international experience and insight combined with local knowledge to solve the most critical problems facing governments today. We actively focus on building solutions that help public sector entities face the challenges of the future and reinvent themselves.

We have a proud record of helping governments meet their challenges head-on, and we work closely with them to build a world that works better for all citizens.

CNS - BC - Transformation Delivery :

It has multiple fields of play such as:

Technical Excellence


Skills and attributes

To qualify for the role you must have
Qualification

Post Graduation: MBA/ PDFM/ Development Management/ Agri Business Management/ PGDFM / Agriculture Science or related field

Shall have 12+ years of experience in areas such as agri-technology, agri start-ups, market linkages, and agri export facilitation


What we look for

People with the ability to work in a collaborative manner to provide services across multiple client departments while following the commercial and legal requirements. You will need a practical approach to solving issues and complex problems with the ability to deliver insightful and practical solutions. We look for people who are agile, curious, mindful and able to sustain postivie energy, while being adaptable and creative in their approach.

What we offer

If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible.

Show more

These jobs might be a good fit

Yesterday
I

Intel Network Security Engineer- Automation Developer United States, Texas

Limitless High-tech career opportunities - Expoint
Design and implement secure, scalable automation solutions. Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability. Develop, test, and deploy Ansible playbooks and...
Description:
Job Description:

Intel's Information Security organization enables Intel to provide secure products, solutions, and services which meet U.S. regulatory requirements. The Information Security organization supports the unique IT information Security and Compliance requirements for Intel federal projects that deliver products and/or services to the US Government (USG). As part of this team, you will help us grow our secure solution suite to meet U.S. Government requirements. The Intel Information Security organization is seeking a Senior Infrastructure Automation Developer to join our team. This role is ideal for a technically strong and forward-thinking individual who can lead by example, influence architectural decisions, and drive automation and integration efforts in a highly regulated environment. Business travel is required as needed.Primary Responsibilities:

  • Design and implement secure, scalable automation solutions.
  • Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability.
  • Develop, test, and deploy Ansible playbooks and Python scripts to automate provisioning, configuration, and management of network devices and services
  • Collaborate with cross-functional teams to define long-term technical direction and roadmap for secure enclave automation.
  • Implement robust monitoring and alerting systems to proactively identify and resolve network issues, leveraging automation for remediation and reporting.
  • Package and deploy applications in compliance with IT and federal security standards.
  • Troubleshoot and resolve technical issues in automation processes, ensuring high reliability and minimal manual intervention.
  • Contribute to system hardening, patching, and compliance automation using industry and DoD standards (e.g., STIG).
  • Support system integration, monitoring, and operational continuity.

You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates. Experience listed below would be obtained through a combination of your degree, research and or relevant previous job and or internship experiences.
Minimum Qualifications:

  • U.S. Citizenship.
  • Ability to obtain a U.S. Government Security Clearance.
  • Bachelor's degree and 3+ years of applicable experience.
  • 1+ years of experience with CI/CD pipelines and version control systems (e.g., Git, GitHub, GitLab).
  • 1+ years of experience in Linux system administration and scripting (Python, Bash, Shell).
  • 1+ years of experience withInfrastructure-as-Codetools (e.g., Ansible).


Preferred Qualifications:

  • Active U.S. Government Top Secret (TS) Security Clearance with SCI eligibility.
  • Bachelor's degree in Computer Science or related field.
  • Good understanding of networking fundamentals (TCP/IP, routing, switching, VLANs, firewalls, etc.)
  • Ability to thrive in dynamic and fast-paced environments.
  • Certifications such as Cisco DevNet, Red Hat Ansible, CompTIA Network+, Python.
  • Experience with embedded software development and system integration.
  • Experience with Cross Domain Solutions (CDS) and DevSecOps principles.
  • Experience with network analysis tools (e.g., Splunk, Wireshark).
  • Experience with secure enclave operations.
  • Experience network equipment and software-defined networking.
  • Strong understanding of IT infrastructure, system patching, and secure deployment practices.
Experienced HireShift 1 (United States of America)US, California, Santa ClaraUS, Arizona, Phoenix, US, Oregon, Hillsboro
Position of Trust

offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here:

Annual Salary Range for jobs which could be performed in the US: 89,150.00 USD - 173,830.00 USD The range displayed on this job posting reflects the minimum and maximum target compensation for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific compensation range for your preferred location during the hiring process.

This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.
Show more

These jobs might be a good fit

Yesterday
EY

EY Business Transformation Architecture Delivery - Staff Consul... United States, Illinois, Chicago

Limitless High-tech career opportunities - Expoint
Working with asset health datasets and the ability to join and connect key datasets together (e.g. notifications / workorders, equipment sensors, failures) to help interconnection of information from different systems....
Description:

As an Asset Health Data Analyst at either the Senior Consultant or Manager rank, you will design, build and implement scalable data solutions that drive significant business value for our asset intensive clients. Collaborating closely with other data and analytics professionals, program teams, management, and stakeholders, you will play a pivotal role in the analytics landscape to help our clients in addressing their asset health and maintenance challenges. Your experience will enable you to comprehend and dissect business requirements, translating them into precise technical specifications. You will serve as a vital link between business stakeholders and technical teams, ensuring that the development process aligns seamlessly with the intended design and objectives.

In line with client requirements, highly desirable would-be familiarity with asset management and health experience of fixed plant equipment (e.g., conveyor belts, screen houses) or mobile equipment (e.g., drills, loaders, haul trucks, light vehicles).

In line with client requirements this role is based in our

Your key responsibilities

  • Working with asset health datasets and the ability to join and connect key datasets together (e.g. notifications / workorders, equipment sensors, failures) to help interconnection of information from different systems.
  • Navigating gaps in data quality and developing options to improve the health of the asset both in the short term and long term.
  • Conduct data-driven equipment failure investigations, failure modes analysis, failure symptoms monitoring and identify data required to assist with the investigation.
  • Be able to clearly explain key insights, strengths and weaknesses of data analysis options to both technical and senior business stakeholders.
  • As required, coordinate the work of junior colleagues or team members to ensure structure and focus on achieving team goals.

Skills and attributes for success

  • Experience with equipment failure investigations and understanding of what data will be required to assist with the investigation.
  • Knowledge in understanding reliability engineering concepts and operational challenges in mining (i.e. condition based monitoring, equipment / asset strategies, mine site operating conditions).
  • Knowledge with data pipeline development, including familiarity of various technologies across time-series data historians (e.g. AVEVA PI) and cloud data platforms (e.g. Databricks, Azure, AWS).
  • Proficiency and demonstrated experience in transformation of large complex data sets from source systems to target platforms (experience in Azure and AWS based solutions using one or more data engineering or data platform technologies required)
  • Evidence of experience in modern development practices including use of code repositories, code review processes, and test frameworks.

Ideally, you’ll also have the skills and attributes below, but don’t worry if you don’t tick all the boxes. We’re interested in your aptitude, attitude and willingness to learn.

  • Ability to introduce innovative ways of organising, managing and integrating data to ensure its quality and ability to be used as a distinctive asset to generate a return.
  • Leads by example and models behaviours that support a culture of safety, health and wellness.
  • Excellent communication skills, and the ability to communicate and present information with purpose, clarity and impact

What we offer you

At EY, we’ll fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • Career development: At EY, your career is yours to shape! We’ll develop you with future-focused skills and equip you with world-class experiences
  • Flexible work arrangements: Our flexible work policies empower you to balance your professional and personal life, fostering a culture of trust and autonomy.
  • A comprehensive benefits package : From a yearly wellness incentive, to access to additional 8 weeks of flex leave per year, and family-friendly policies, including 26 weeks of gender-neutral paid parental leave, we cater to your diverse needs to help you thrive both personally and professionally

Acknowledgement of Country

Building a

Our preferred applicant willbe required

© 2025 Ernst & Young Australia.A member firm of Ernst & Young Global Limited.All Rights Reserved. Liability limited by a scheme approved under Professional Standards Legislation

Show more

These jobs might be a good fit

Yesterday
AM

Applied Materials Operational Technology OT Security Engineer United States, California

Limitless High-tech career opportunities - Expoint
Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs. Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82). Implement network...
Description:

$124,000.00 - $171,000.00Santa Clara,CA

About the Role

This is not just another security role—it’s a chance to. You’ll combinewith
strategic architectural vision, ensuring our industrial ecosystems remain secure, compliant, and future-ready.

The OT Security Engineer is responsible for safeguarding industrial control systems (ICS), SCADA environments, and other OT assets against cyber threats. This role ensures the confidentiality, integrity, and availability of critical infrastructure systems while maintaining operational functionality. The engineer integrates cybersecurity best practices into OT environments, balancing security with operational requirements

Security Architecture & Design

  • Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs.
  • Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82).
  • Implement network segmentation, secure remote access, and least-privilege models across IT/OT boundaries.
  • Drive architectural reviews and influence security strategy across the enterprise

Risk Management & Compliance

  • Perform risk assessments and vulnerability analysis for OT environments.
  • Ensure compliance with regulatory frameworks (e.g., RMF, ISO 27001).

Advanced Vulnerability Management

  • Lead vulnerability assessments for PLCs, SCADA, IIoT devices , and industrial networks.
  • Develop proactive remediation strategies aligned with industry frameworks and operational priorities.
  • Integrate threat intelligence into architecture and vulnerability workflows.

Innovation & Collaboration

  • Partner with engineering, operations, and IT teams to embed security into the system lifecycle .
  • Evaluate emerging technologies and tools to strengthen OT/IoT security posture.
  • Work closely with facilities and lab manufacturing teams to integrate security into operational workflows.
  • Provide guidance and training to lab, manufacturing team personnel on OT security best practices

What We’re Looking For

  • Deep expertise in OT/IoT security architecture and vulnerability management.
  • 7–10 years in OT/ICS cybersecurity with proven experience designing secure industrial environments.
  • Strong knowledge of ICS protocols (Modbus, OPC, Ethernet/IP) and industrial control systems.
  • Familiarity with ISA/IEC 62443 , Purdue Model, NIST CSF , ISO 27001.
  • Hands-on experience with Armis, Dragos, Claroty , or similar platforms.

Preferred Qualifications

  • Experience in highly regulated environments (energy, manufacturing, pharma).
  • Knowledge of threat modeling and penetration testing for OT systems.
  • Familiarity with emerging technologies like IoT in industrial environments.
  • Semiconductor or advanced manufacturing experience.
  • Knowledge of SEMI standards (E187/E188/E191).
  • Certifications: GICSP , CISSP , or equivalent.

Soft Skills:

  • Strong communication skills for cross-functional collaboration.
  • Ability to translate technical security concepts for non-technical stakeholders.

Full time

Assignee / Regular

Show more

These jobs might be a good fit

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
Description:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
The role of a Sap Security Consultant is a highly sought after and rewarding one for those in the tech industry. As part of the IT landscape, Sap Security Consultants ensure data security for companies using information systems and providing a tailor-made analysis and solution to unique security threats. Due to the nature of the industry, the responsibility of a Sap Security Consultant carries high risk. Those taking up the role must have strong knowledge in the area of risk management and be able to assess security threats and identify areas where an organization needs to improve its security. They must be adept in the use of security tools and software, including but not limited to monitoring tools, virus detection tools, encryption/decryption tools and firewalls. Along with technical insight and proficiency, the role of a Sap Security Consultant also requires strong communication skills. They must be able to explain complicated security measures in an understandable manner to their clients, and demonstrate their understanding of the existing security systems. They must also be able to discuss complex security-related issues and ensure compliance with regulatory requirements. By joining Expoint, you can become an integral part of the IT security domain. Those who embrace this challenging position will gain a solid understanding of the inner workings of Sap Security software, gain problem-solving and technical skills, and build a strong portfolio that can increase their employment prospects. Not only will you benefit from an exciting new career, but through continuous learning and evolving technical knowledge, you can become a much sought-after security expert.