Expoint – all jobs in one place
Finding the best job has never been easier

United States, California, Cyber Security jobs

With Expoint, the dream vaccancy is waiting for you around the corner. Jobs as United States, California, Cyber Security, is this the job you are looking for? We definitely have a United States, California, Cyber Security job with your name on it.
Company
Job type
Job categories
Job title (1)
United States
State
City
3,860 jobs found
Yesterday
EY

EY Chief Information Security Officer CISO - US Government & Pu... United States, Virginia, Arlington

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
Description:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
Yesterday
I

Intel Network Security Engineer- Automation Developer United States, Texas

Limitless High-tech career opportunities - Expoint
Design and implement secure, scalable automation solutions. Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability. Develop, test, and deploy Ansible playbooks and...
Description:
Job Description:

Intel's Information Security organization enables Intel to provide secure products, solutions, and services which meet U.S. regulatory requirements. The Information Security organization supports the unique IT information Security and Compliance requirements for Intel federal projects that deliver products and/or services to the US Government (USG). As part of this team, you will help us grow our secure solution suite to meet U.S. Government requirements. The Intel Information Security organization is seeking a Senior Infrastructure Automation Developer to join our team. This role is ideal for a technically strong and forward-thinking individual who can lead by example, influence architectural decisions, and drive automation and integration efforts in a highly regulated environment. Business travel is required as needed.Primary Responsibilities:

  • Design and implement secure, scalable automation solutions.
  • Lead development ofInfrastructure-as-Codeand orchestration tools to improve execution velocity, reduce operational overhead, and enhance system reliability.
  • Develop, test, and deploy Ansible playbooks and Python scripts to automate provisioning, configuration, and management of network devices and services
  • Collaborate with cross-functional teams to define long-term technical direction and roadmap for secure enclave automation.
  • Implement robust monitoring and alerting systems to proactively identify and resolve network issues, leveraging automation for remediation and reporting.
  • Package and deploy applications in compliance with IT and federal security standards.
  • Troubleshoot and resolve technical issues in automation processes, ensuring high reliability and minimal manual intervention.
  • Contribute to system hardening, patching, and compliance automation using industry and DoD standards (e.g., STIG).
  • Support system integration, monitoring, and operational continuity.

You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates. Experience listed below would be obtained through a combination of your degree, research and or relevant previous job and or internship experiences.
Minimum Qualifications:

  • U.S. Citizenship.
  • Ability to obtain a U.S. Government Security Clearance.
  • Bachelor's degree and 3+ years of applicable experience.
  • 1+ years of experience with CI/CD pipelines and version control systems (e.g., Git, GitHub, GitLab).
  • 1+ years of experience in Linux system administration and scripting (Python, Bash, Shell).
  • 1+ years of experience withInfrastructure-as-Codetools (e.g., Ansible).


Preferred Qualifications:

  • Active U.S. Government Top Secret (TS) Security Clearance with SCI eligibility.
  • Bachelor's degree in Computer Science or related field.
  • Good understanding of networking fundamentals (TCP/IP, routing, switching, VLANs, firewalls, etc.)
  • Ability to thrive in dynamic and fast-paced environments.
  • Certifications such as Cisco DevNet, Red Hat Ansible, CompTIA Network+, Python.
  • Experience with embedded software development and system integration.
  • Experience with Cross Domain Solutions (CDS) and DevSecOps principles.
  • Experience with network analysis tools (e.g., Splunk, Wireshark).
  • Experience with secure enclave operations.
  • Experience network equipment and software-defined networking.
  • Strong understanding of IT infrastructure, system patching, and secure deployment practices.
Experienced HireShift 1 (United States of America)US, California, Santa ClaraUS, Arizona, Phoenix, US, Oregon, Hillsboro
Position of Trust

offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here:

Annual Salary Range for jobs which could be performed in the US: 89,150.00 USD - 173,830.00 USD The range displayed on this job posting reflects the minimum and maximum target compensation for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific compensation range for your preferred location during the hiring process.

This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.
Show more

These jobs might be a good fit

Yesterday
EY

EY Cyber Triage Forensic Senior Analyst United States, New Jersey

Limitless High-tech career opportunities - Expoint
Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified. Forensically analyze end user systems and servers found to have possible indicators of...
Description:


Your key responsibilities

  • Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
  • Forensically analyze end user systems and servers found to have possible indicators of compromise
  • Analysis of artifacts collected during a security incident/forensic analysis
  • Identify security incidents through ‘Hunting’ operations within a SIEM, EDR and other relevant tools
  • Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including obtaining access to systems, digital artifact collection, and containment and/or remediation actions
  • Provide consultation and assessment on perceived security threats
  • Maintain, manage, improve and update security incident process and protocol documentation
  • Regularly provide reporting and metrics on case work
  • Resolution of security incidents by identifying root cause and solutions
  • Analyze findings in investigative matters, and develop fact based reports
  • Be on-call to deliver global incident response

Skills and attributes for success

  • Resolution of security incidents by identifying root cause and solutions
  • Analyze findings in investigative matters, and develop fact-based reports
  • Proven integrity and judgment within a professional environment
  • Ability to appropriately balance work/personal priorities
  • Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
  • 7+ years experience in incident response, computer forensics analysis and/or malware reverse engineering
  • Understanding of security threats, vulnerabilities, and incident response
  • Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis
  • Be familiar with legalities surrounding electronic discovery and analysis
  • Experience with EDR and SIEM technologies (i.e. Splunk)
  • Deep understanding of both Windows and Unix/Linux based operating systems

Ideally, you’ll also have

  • Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GREM
  • Background in security incident response in Cloud-based environments, such as Azure
  • Programming skills in PowerShell, Python and/or C/C++
  • Understanding of the best security practices for network architecture and server configuration

What we look for

  • Demonstrated integrity in a professional environment
  • Ability to work independently
  • Have a global mind-set for working with different cultures and backgrounds
  • Knowledgeable in business industry standard security incident response process, procedures, and life cycle
  • Positive attitude and Excellent teaming skills
  • Excellent social, communication, and writing skills
  • Good presentation skills
  • Excellent investigative, analytical, and problem-solving skills

What we offer you


At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $128,100 to $239,600. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $153,800 to $272,300. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

These jobs might be a good fit

Yesterday
EY

EY Consultor/a Cyber - Data Protection United States, New Mexico

Limitless High-tech career opportunities - Expoint
Wellbeing HUB: incluye políticas y acciones para la salud física (Wellhub) y mental. Seguro de Vida y Accidentes. Oficina Bankinter con condiciones especiales. Plan de Compensación Flexible EY Flex (transporte,...
Description:

En EY, damos forma al futuro con confianza.


Aquí encontrarás más que un trabajo: una oportunidad para crecer, aprender y dejar huella.

Únete a nuestros 7.000 profesionales en España y 15 oficinas y a una red global de 400.000 personas que trabajan cada día para transformar negocios y sociedades.

ShapeTheFutureWithConfidence | #EYCareers | #BuildingABetterWorkingWorld

La oportunidad

En EY, somos una firma global líder en auditoría, consultoría, estrategia y transacciones y servicios legales y fiscales.
Nos impulsa la innovación, la tecnología y el propósito de generar un impacto positivo duradero.


Tus funciones principales:

Actualmente buscamos un Consultor en el área de Protección de datos y Privacidad con experiencia de, al menos, 3 años de experiencia e interés en la implementación y asesoría de protección de datos.

• Prevención de pérdida de datos empresariales.

• Clasificación y etiquetado de datos.

• Gestión de derechos digitales (DRM).

• Prevención de pérdida de datos en la nube (CASB)

• Administración de herramientas (DLP, CASB y SWG).

Requisitos

• Graduad@ en ingeniería, matemáticas, estadística, física o similares.

• Nivel alto de inglés.


¿Qué te ofrecemos?

Bienestar y beneficios personales

  • Wellbeing HUB: incluye políticas y acciones para la salud física (Wellhub) y mental.
  • Seguro de Vida y Accidentes.
  • Oficina Bankinter con condiciones especiales.
  • Plan de Compensación Flexible EY Flex (transporte, formación, tarjeta restaurante, guardería…).

Flexibilidad y conciliación

  • Trabajo híbrido y flexibilidad según proyecto.

Desarollo profesional

  • Formación continua a través de EY University, con un itinerario formativo individualizado.
  • Plan de carrera para potenciar el crecimiento anual dentro de la firma.
  • Acompañamiento personalizado: contarás con el apoyo de un Buddy y un Counselor durante toda tu trayectoria.

Cultura y entorno de trabajo

  • Trabajo en un entorno dinámico y colaborativo.
  • Oportunidad de colaborar con equipos globales y multidisciplinares.
  • Ampliación de tu red profesional en un contexto diverso y enriquecedor.

Compromiso social

  • Acciones de impacto social desde la Fundación EY.

#LI-HYBRID

Show more

These jobs might be a good fit

Yesterday
AM

Applied Materials Operational Technology OT Security Engineer United States, California

Limitless High-tech career opportunities - Expoint
Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs. Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82). Implement network...
Description:

$124,000.00 - $171,000.00Santa Clara,CA

About the Role

This is not just another security role—it’s a chance to. You’ll combinewith
strategic architectural vision, ensuring our industrial ecosystems remain secure, compliant, and future-ready.

The OT Security Engineer is responsible for safeguarding industrial control systems (ICS), SCADA environments, and other OT assets against cyber threats. This role ensures the confidentiality, integrity, and availability of critical infrastructure systems while maintaining operational functionality. The engineer integrates cybersecurity best practices into OT environments, balancing security with operational requirements

Security Architecture & Design

  • Develop secure architectures for OT systems, including ICS, SCADA, PLCs, and HMIs.
  • Conduct design and architecture reviews to ensure compliance with security standards (e.g., ISA/IEC 62443, NIST 800-82).
  • Implement network segmentation, secure remote access, and least-privilege models across IT/OT boundaries.
  • Drive architectural reviews and influence security strategy across the enterprise

Risk Management & Compliance

  • Perform risk assessments and vulnerability analysis for OT environments.
  • Ensure compliance with regulatory frameworks (e.g., RMF, ISO 27001).

Advanced Vulnerability Management

  • Lead vulnerability assessments for PLCs, SCADA, IIoT devices , and industrial networks.
  • Develop proactive remediation strategies aligned with industry frameworks and operational priorities.
  • Integrate threat intelligence into architecture and vulnerability workflows.

Innovation & Collaboration

  • Partner with engineering, operations, and IT teams to embed security into the system lifecycle .
  • Evaluate emerging technologies and tools to strengthen OT/IoT security posture.
  • Work closely with facilities and lab manufacturing teams to integrate security into operational workflows.
  • Provide guidance and training to lab, manufacturing team personnel on OT security best practices

What We’re Looking For

  • Deep expertise in OT/IoT security architecture and vulnerability management.
  • 7–10 years in OT/ICS cybersecurity with proven experience designing secure industrial environments.
  • Strong knowledge of ICS protocols (Modbus, OPC, Ethernet/IP) and industrial control systems.
  • Familiarity with ISA/IEC 62443 , Purdue Model, NIST CSF , ISO 27001.
  • Hands-on experience with Armis, Dragos, Claroty , or similar platforms.

Preferred Qualifications

  • Experience in highly regulated environments (energy, manufacturing, pharma).
  • Knowledge of threat modeling and penetration testing for OT systems.
  • Familiarity with emerging technologies like IoT in industrial environments.
  • Semiconductor or advanced manufacturing experience.
  • Knowledge of SEMI standards (E187/E188/E191).
  • Certifications: GICSP , CISSP , or equivalent.

Soft Skills:

  • Strong communication skills for cross-functional collaboration.
  • Ability to translate technical security concepts for non-technical stakeholders.

Full time

Assignee / Regular

Show more

These jobs might be a good fit

Yesterday
EY

EY Cyber SDC - Attack & Penetration Senior Consulting Location ... United States, Texas, Dallas

Limitless High-tech career opportunities - Expoint
Lead, scope, and execute penetration testing projects, including web applications (including black box, white box, and gray box assessments), networks, cloud environments, hardware, and firmware. Develop and execute red team...
Description:

As a Senior Consultant in Offensive Security within our Service Delivery Center, you will play a pivotal role in enhancing our clients' security posture through proactive threat assessments and vulnerability management. You will lead and collaborate with a team of cybersecurity professionals to implement and manage offensive security initiatives, ensuring that security measures are integrated throughout the software development lifecycle while optimizing service delivery processes.

In this role, you will manage and execute penetration testing, red teaming, and security assessments for our clients. You will work closely with cross-functional teams to identify vulnerabilities, develop mitigation strategies, and ensure that security practices align with industry standards. Your expertise will drive the team’s efforts in automating security processes and help our clients build a more secure working world.

Your Key Responsibilities

  • Lead, scope, and execute penetration testing projects, including web applications (including black box, white box, and gray box assessments), networks, cloud environments, hardware, and firmware.
  • Develop and execute red team and purple team scenarios to identify gaps in organizational security postures and provide actionable recommendations.
  • Perform in-depth penetration testing results create comprehensive reports detailing findings, exploitation procedures, risks, and recommendations.
  • Stay current with emerging security threats, vulnerabilities, and industry best practices, and promote continual learning within the team.
  • Assist in configuring, handling, patching, and updating penetration testing software an supporting infrastructure to ensure optimal performance and security.
  • Contribute to the creation and updating of operational metrics for client meetings, providing insights into tool performance and security findings.

Skills and Attributes for Success

  • Proven experience in penetration testing and offensive security practices, with a minimum of 5+ years of related work experience.
  • Strong knowledge of automation tools and processes, particularly in the context of offensive security and application security.
  • Excellent problem-solving skills and the ability to manage multiple security projects simultaneously.
  • Effective communication skills to liaise with clients and internal stakeholders, translating complex technical concepts into understandable terms.

To qualify for the role, you must have

  • Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.
  • A minimum of ten (10) years’ experience performing penetration tests; or a minimum of five (5) years working in an electric utility in generation, or transmission & distribution performing penetration tests
  • Extensive experience with manual attack and penetration testing, including web applications, networks, and cloud environments.
  • Proficiency in scripting languages (e.g., Python, Bash, PowerShell) for automation of security tasks.
  • Knowledge of Windows, Linux, Unix, and other major operating systems.

Ideally, you’d also have

  • Certifications such as CCSP, CSSLP, OSCP, OSWP, GPEN, GWAPT, OSCE, OSEE, GXPN, CISSP, CISM, etc.
  • Contributions to the security community, including research, public CVE disclosures, bug bounty acknowledgments, and open-source project involvement.
  • Strong analytical skills with the ability to interpret complex information and communicate it effectively.
  • Active interest in staying updated on the latest cybersecurity threats and trends, promoting continual learning and adaptation.

What We Offer

  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to succeed in high performing teams.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.

What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $77,500 to $140,900. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $92,900 to $160,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

These jobs might be a good fit

Yesterday
EY

EY Cyber - Digital Identity SME Senior Consulting Location OPEN United States, Texas, Dallas

Limitless High-tech career opportunities - Expoint
Current state privileged access management assessments. Capability maturity and benchmarking assessments. Developing PAM strategy and road maps. Target operating model and governance. PAM policies, procedures, and standards. Vendor analysis and...
Description:

In a rapidly changing IT environment, clients from all industries look to us for trusted solutions for their increasingly complex risks and vulnerabilities. As a part of our digital identity (DI) and privileged access management (PAM) teams you’ll be right at the heart of that goal, helping clients gain insight and context to their complex PAM environments and assessing, improving, and building infrastructure, processes and policies in order to meet the client’s current and next generation PAM needs. You’ll get to use your technical and business skills in order to help us drive this mission and have an impact on cyber security at a global level.

You’ll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world.

Your key responsibilities

Within the privileged access management team, you’ll work in the following areas:

  • Current state privileged access management assessments
  • Capability maturity and benchmarking assessments
  • Developing PAM strategy and road maps
  • Target operating model and governance
  • PAM policies, procedures, and standards
  • Vendor analysis and assessments
  • Design and architecture for PAM transformation.
  • PAM Process and policies design and re-engineering
  • Implementation, expansion, and integrations
  • PAM solution migrations
  • Discovery, remediation and onboarding of privileged accounts and secrets
  • Operation process automation

Skills and attributes for success

  • Effectively lead and motivate client engagement teams and provide technical leadership in the assessment, design, and implementation of security and IT risk solutions
  • Foster an innovative and inclusive team-oriented work environment. Play an active role in counselling and mentoring junior consultants within the firm
  • Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes and assist with business development opportunities.
  • Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business.

To qualify for the role, you must have.

  • A bachelor's degree in a related field and approximately 5 years of related work experience; or a graduate degree and approximately 4 years of related work experience
  • Experience in one or more of the following:
    • Privileged access management solutions including design or implementation of PAM technologies (such as CyberArk, BeyondTrust, Delinea, HashiCorp);
    • Role-based access control including design and development of user access roles.
    • Experience in secret management solutions including understanding of DevOps (Ansible, Jenkins, Gitlab, Kubernetes, terraforms) and cloud (Azure, AWS and GCP) solutions sets.
    • Ability in Windows, Linux, and Unix operating systems
    • Exposure to the IGA solutions (SailPoint or Saviynt)
    • Exposure to the scripting and programming languages (PowerShell, Java, C#) and Microsoft office (word and PowerPoint, Visio)
  • An understanding of access control concepts including directory services, SAML, LDAP, PKI
  • Experience in process definition, workflow design, and process mapping.
  • A valid driver's license in the US and a valid passport required; willingness and ability to travel internationally and a willingness to travel; travel is estimated at 40-60%

Ideally, you’d also have

  • Strong presentation and communication skills and ability to speak with director and VP levels.
  • CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certification desired; non-certified hires are required to become certified within 1 year from the date of hire.
  • CyberArk, BeyondTrust, Delinea, HashiCorp, vendor certifications are desired.

What we offer you
At EY, we’ll develop you with future-focused skills and equip you with world-class experiences. We’ll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn .

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $104,800 to $192,200. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $125,800 to $218,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more

These jobs might be a good fit

Limitless High-tech career opportunities - Expoint
The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across...
Description:

Responsibilities

  • The successful candidate will work with GPS engagement teams, supporting functions, and EY’s Client Technology and Global Information Security organizations to develop and maintain a security and compliance program across all environments, platforms and applications used or desired for use by GPS. Responsibilities include:
  • Strategy, Governance and Risk Management
  • Development and execution of a multiyear cybersecurity strategy and investment roadmap aligned to business objectives and federal contract requirements.
  • Development, management and maintenance of the GPS IT security risk management policy and/or procedural documentation mapped to NIST SP 800-37 (RMF), NIST SP 80053, NIST SP 800171, NIST SP 800161 (CSCRM), and NIST SP 800218 (SSDF)
  • Ownership of the enterprise risk assessment (ERA), business impact analysis (BIA), and security metrics; present posture and material risk to the COO on a recurring cadence.

Defense Industrial Base Compliance (Classified & Unclassified)

  • Manage GPS compliance with DFARS 252.204-7012, 252.204-7020, and 252.204-7021. This includes:
    • Leading DFARS/CMMC readiness and ongoing compliance.
    • Serving as the Affirming Official (AO) and maintaining an accurate SPRS selfassessment score with defensible Plans of Action and Milestones (POAMs).
    • Achieving and maintaining CMMC certification at level 2.
    • Overseeing management and maintenance of POAMs.
  • Ensure systems operated for the government are designed properly and assessed against the appropriate requirements such as FedRAMP, Cloud Computing Security Requirements Guide, IRS 1075, and MARS-E.
  • Ensure safeguarding and incident reporting obligations for CUI (e.g., DFARS 252.2047012 72hour reporting) are met; coordinate with DC3/DIBNet and affected customers when necessary.
  • Oversee NISPOM compliance for classified systems; partner with FSO to achieve and maintain Authorizations to Operate (ATOs).
  • Ensure proper handling of exportcontrolled data (ITAR/EAR).
  • Prepare for and lead Program through contractually required assessments and customer audits; keep evidence, policies, configurations, and logs auditready.
  • Respond to government inspections or audits in coordination with EY Information Security and Risk Management.

Secure Cloud, Identity & Enterprise Platforms

  • Own security architecture and controls for Azure Government (Azure Gov) and Microsoft 365 GCC High tenants, including Conditional Access, PIM/PAM, encryption, logging/retention, and data governance for CUI.
  • Implement Zero Trust principles across identity, endpoints, networks, and workloads; drive continuous verification and leastprivilege.
  • Deploy and operate EDR/XDR, SIEM/SOAR, DLP, CASB/SSE/SASE, MDM, key management/HSM, and vulnerability/configuration management at scale.
  • Oversee user authorization process and ongoing attestation of user authorization and access.
  • Assist to resolve GPS practitioners’ access or other issues with Enclave environments.
  • Ongoing development, coordination and sustainment of Information Security Continuous Monitoring (ISCM) Program across all applications within the environment.

DevSecOps & Secure SDLC

  • Establish a software security program aligned to NIST SSDF (SP 800218) and EO 14028 expectations; integrate security into SDLC across GitHub and Azure DevOps.
  • Govern AppSec tooling and policy: SAST (e.g., Checkmarx), DAST (e.g., Qualys/AppScan), SCA/OSS (e.g., Mend), IaC/container/K8s scanning, and Wiz/Wiz Code; enforce buildtime gates and remediation SLAs.
  • Require SBOM generation, artifact signing/provenance (e.g., SLSA targets), and secrets management across all repositories and pipelines.

Detection, Response & Resilience

  • Develop, manage and maintain GPS incident response program.
  • Lead SOC and CSIRT functions: 24×7 monitoring, threat intelligence, purple/redteam exercises, and executive tabletop drills.
  • Maintain and test the Incident Response Plan and Cyber Crisis Playbook, including regulatory/customer communications and forensics preservation.

Effective Business Integration

  • Ensure development of fit-for-purpose solutions that support the business activities.
  • Manage integration of Firm applications into the GPS Enclave environment.
  • Understand and facilitate communication of EY’s IT disaster recovery and business continuity plans to GPS clients, potential clients and engagement teams (including engagement team responsibilities).
  • Augment existing Client Security Assurance reviews of data protection requirements contained in RFPs/RFQs to adequately respond, and assist in development of GPS client security and data protection (confidentiality) plans.
  • Monitor regulatory or other developments in INFOSEC principles, regulatory requirements and leading practices.

Leadership, Team and Budget

  • Role model a leadership style that brings infrastructure, application and cybersecurity professionals together to collaborate constructively on the design, implementation and operation of controls.
  • Build and mentor a highperforming organization spanning Policy/GRC, AppSec/DevSecOps, Security Engineering/Architecture, SOC/IR, and ThirdParty & SupplyChain Risk.
  • Own the cybersecurity budget and vendor portfolio; rationalize tools and services for value, performance, and compliance.
  • Participate in purchasing and enhancement of third-party tools for GPS.
  • Augment and potentially streamline existing Vendor Supplier Risk Assurance Program during evaluation of subcontractor compliance with applicable cybersecurity and data protection clauses.
  • Drive a securityfirst culture: ongoing training, phishing simulations, secure coding education, and leadership engagement including data protection and awareness and role-based training programs.
  • Coordinate and respond to annual (or more frequent) independent risk assessments and cyber security reviews.

Qualifications:

  • 12+ years of progressive cybersecurity leadership, including 5+ years at the enterprise or businessunit executive level.
  • 5+ years FISMA related experience
  • Bachelor’s degree in IT-related field or bachelor’s degree in non-IT related field with a total of 10 years of information security experience
  • Master’s degree preferred
  • Ability to obtain and maintain Top Secret clearance
  • US citizenship required
  • Must have government sector experience
  • Thorough knowledge and understanding of:
    • FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems
    • DFARS 252.204-7012, Safeguarding Covered Defense Information and Cyber Incident Reporting
    • NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
    • NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations
    • GSAM 552.239-70, Information Technology Security Plan and Security Authorization, 552.239-71, Security Requirements for Unclassified Information Technology Resources and similar clauses in agency FAR supplements
    • FISMA
  • Specialized knowledge and experience with the implementation of the NIST Special Publication (SP) 800 family of publications, particularly those associated with the Risk Management Framework
  • Proven experience in the Defense Industrial Base with DFARS/CMMC and NIST SP 800171 implementation and audits (including POA&M and SPRS management).
  • Experience with FEDRAMP compliance authorization and monitoring
  • Deep expertise securing Azure Government and Microsoft 365 GCC High environments
  • Experience working with other Government cloud communities, including AWS
  • Experience working with classified environments, achieving/maintaining ATOs, overseeing classified systems under NISPOM and DoD RMF, and working understanding of SCIF operations
  • Knowledge and experience with vulnerability scanning execution, assessment, and analysis
  • Knowledge and experience of networks, including LAN and WAN
  • Knowledge and experience with application security, database security, and network security
  • Experience with evaluating system, network, or infrastructure security controls against requirements such as FISMA, FIPS, and NIST guidelines
  • Handson leadership of DevSecOps and software security programs covering GitHub/Azure DevOps/Jenkins with SAST/DAST/SCA, IaC/container security, SBOMs, and supplychain controls.
  • Demonstrated analytical, problem-solving, organizational, interpersonal and communication skills required.
  • The ability to collaborate effectively with diverse stakeholders, including client-facing, legal, finance and contracting teams, executives, engineers, customers and assessors on a wide variety of tasks, as needed.
  • Ability to foster professionalism and demonstrate integrity and confidentiality in all actions.
  • Ability to demonstrate flexibility when required, sense urgency, organize and prioritize work, and achieve against tight deadlines.
  • The ability to interpret and communicate regulatory requirements related to cybersecurity and data protection.
  • Possession of excellent written/verbal communications skills.
  • Possession of excellent analytical skills, including strict attention to detail.
  • Ability to assess and weigh current and evolving security threats in an operational environment
  • Possession of Information Systems Security Professional certification (CISSP)
  • Certifications such as CISSP, CISM, CCISO, CCSP, CRISC, CISA, PMP, and relevant GIAC credentials preferred

What we offer you

  • We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $235,700 to $466,700. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $282,900 to $530,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
  • Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
  • Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.


Show more
Unlock new opportunities in the high tech industry with Expoint. Our job searching platform offers a user-friendly search for positions based on your desired job title, made to help you advance your career to the next level. Discover the best opportunities in software development, United States, California, Cyber Security, or any other high tech field with ease. Take your career to the next level and start your high tech journey with Expoint today.